{"vulnerability": "CVE-2025-2020", "sightings": [{"uuid": "a037c959-4c6b-4055-b822-563954831a9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20207", "type": "seen", "source": "https://t.me/cvedetector/17298", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20207 - Cisco Secure Email and Web Manager/Cisco Secure Email Gateway/Cisco Secure Web Appliance SNMP Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20207 \nPublished : Feb. 5, 2025, 5:15 p.m. | 49\u00a0minutes ago \nDescription : A vulnerability in Simple Network Management Protocol (SNMP) polling for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, remote attacker to obtain confidential information about the underlying operating system.  \n  \nThis vulnerability exists because the appliances do not protect confidential information at rest in response to SNMP poll requests. An attacker could exploit this vulnerability by sending a crafted SNMP poll request to the affected appliance. A successful exploit could allow the attacker to discover confidential information that should be restricted. To exploit this vulnerability, an attacker must have the configured SNMP credentials. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T19:09:00.000000Z"}, {"uuid": "7ef78fe2-ac9c-4e1b-97e1-6462107eda6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20205", "type": "seen", "source": "https://t.me/cvedetector/17297", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20205 - Cisco Identity Services Engine XSS\", \n  \"Content\": \"CVE ID : CVE-2025-20205 \nPublished : Feb. 5, 2025, 5:15 p.m. | 49\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\u00a0  \n  \nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T19:08:59.000000Z"}, {"uuid": "5102ffa4-5a83-40c6-8668-5b31bb5a4a56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20204", "type": "seen", "source": "https://t.me/cvedetector/17296", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20204 - \"Cisco ISE Web-Based Management Interface Cross-Site Scripting Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-20204 \nPublished : Feb. 5, 2025, 5:15 p.m. | 49\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\u00a0  \n  \nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T19:08:58.000000Z"}, {"uuid": "a4bc8614-e1a6-4877-a70e-caad3bcccd4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20206", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6559", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20206\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability in the interprocess communication (IPC) channel of Cisco Secure Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the Secure Firewall Posture Engine, formerly HostScan, is installed on Cisco Secure Client.\n\nThis vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to a specific Cisco Secure Client process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker must have valid user credentials on the Windows system.\n\ud83d\udccf Published: 2025-03-05T16:14:00.258Z\n\ud83d\udccf Modified: 2025-03-05T16:14:00.258Z\n\ud83d\udd17 References:\n1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secure-dll-injection-AOyzEqSg", "creation_timestamp": "2025-03-05T16:32:22.000000Z"}, {"uuid": "fbe856ed-627d-4980-a9a0-aeb9ba1aab7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20208", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6577", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20208\n\ud83d\udd25 CVSS Score: 4.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.  \n This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.\n\ud83d\udccf Published: 2025-03-05T16:50:09.237Z\n\ud83d\udccf Modified: 2025-03-05T17:07:03.160Z\n\ud83d\udd17 References:\n1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-xss-vuln-WbTcYwxG", "creation_timestamp": "2025-03-05T18:30:31.000000Z"}, {"uuid": "bcad8491-264c-4688-811a-c7cc34883d77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20209", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7339", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20209\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A vulnerability in the Internet Key Exchange version 2 (IKEv2) function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to prevent an affected device from processing any control plane UDP packets.&nbsp;\n\nThis vulnerability is due to improper handling of malformed IKEv2 packets. An attacker could exploit this vulnerability by sending malformed IKEv2 packets to an affected device. A successful exploit could allow the attacker to prevent the affected device from processing any control plane UDP packets, resulting in a denial of service (DoS) condition.\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\ud83d\udccf Published: 2025-03-12T16:13:12.340Z\n\ud83d\udccf Modified: 2025-03-12T16:13:12.340Z\n\ud83d\udd17 References:\n1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrike-9wYGpRGq\n2. https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/", "creation_timestamp": "2025-03-12T16:41:20.000000Z"}, {"uuid": "1296ded3-ad4c-419f-94b5-1da72b8c9047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20205", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952312513443564", "content": "", "creation_timestamp": "2025-02-05T16:51:40.265617Z"}, {"uuid": "4649d2ec-9994-4d70-a78d-0415352646cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20207", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952312528088269", "content": "", "creation_timestamp": "2025-02-05T16:51:40.618246Z"}, {"uuid": "27f9500b-1c6c-4edf-80d7-e511bbe82520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20207", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhh36rguup2f", "content": "", "creation_timestamp": "2025-02-05T17:16:33.361370Z"}, {"uuid": "cca8efd0-da9b-442f-9721-13adf3c04a16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20206", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljnrdrruvj2f", "content": "", "creation_timestamp": "2025-03-05T19:59:26.672371Z"}, {"uuid": "764d9099-6241-49c1-94a0-44ac2fdd37d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-20206", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3ljrlysngic2a", "content": "", "creation_timestamp": "2025-03-07T08:34:28.061728Z"}, {"uuid": "2e0fa0b3-5cb0-495d-9a0e-757f6b717aa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20203", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lltt65lw3l2s", "content": "", "creation_timestamp": "2025-04-02T16:38:27.142789Z"}, {"uuid": "576690b2-2218-403a-96b3-a4f0ad266d44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20203", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llu3i4s5xl2i", "content": "", "creation_timestamp": "2025-04-02T19:07:14.914030Z"}, {"uuid": "6f2a8bcd-e828-4129-a528-0fcb9440db2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20206", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:48.000000Z"}, {"uuid": "84b1195a-ba60-461a-87f6-f90ca70906c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20208", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:48.000000Z"}, {"uuid": "0b460057-e8da-4c01-8281-b29449da5eeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20208", "type": "seen", "source": "https://t.me/cvedetector/19650", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20208 - \"Cisco TelePresence Management Suite XSS Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-20208 \nPublished : March 5, 2025, 5:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.    \n  \n This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T21:07:31.000000Z"}, {"uuid": "e9b6da40-4c6c-4606-92c1-dffecceb9b85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20206", "type": "seen", "source": "https://t.me/cvedetector/19649", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20206 - Cisco Secure Client DLL Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20206 \nPublished : March 5, 2025, 5:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : A vulnerability in the interprocess communication (IPC) channel of Cisco Secure Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the Secure Firewall Posture Engine, formerly HostScan, is installed on Cisco Secure Client.  \n  \nThis vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to a specific Cisco Secure Client process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker must have valid user credentials on the Windows system. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T21:07:30.000000Z"}, {"uuid": "43871742-144d-4dca-9aaf-c19124b33762", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20204", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhh36mli6h2h", "content": "", "creation_timestamp": "2025-02-05T17:16:28.162439Z"}, {"uuid": "d73ca461-5870-43fd-b0f7-b2da68bb0e88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20205", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhh36owefe2j", "content": "", "creation_timestamp": "2025-02-05T17:16:31.019810Z"}, {"uuid": "596c22dc-5146-4fa1-966b-baa1213afdcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20203", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10118", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20203\n\ud83d\udd25 CVSS Score: 4.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of the interface of an affected system.\n The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious code into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials.\n    \n  {{value}} [\"%7b%7bvalue%7d%7d\"])}]]\n\ud83d\udccf Published: 2025-04-02T16:17:24.683Z\n\ud83d\udccf Modified: 2025-04-02T16:17:24.683Z\n\ud83d\udd17 References:\n1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-GSScPGY4", "creation_timestamp": "2025-04-02T16:34:51.000000Z"}, {"uuid": "9dd4f447-cd0f-4f51-a52d-8608b6cd600d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20203", "type": "seen", "source": "https://t.me/cvedetector/21901", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20203 - Cisco EPNM and Prime Infrastructure Stored Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-20203 \nPublished : April 2, 2025, 5:15 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of the interface of an affected system.  \n  \n The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious code into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials.  \n  \n      \n  \n  {{value}} [\"%7b%7bvalue%7d%7d\"])}]] \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T20:50:37.000000Z"}, {"uuid": "38943bc7-9ccb-43b7-be6c-c53698544135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20202", "type": "seen", "source": "https://t.me/cvedetector/24747", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20202 - Cisco IOS XE Wireless Controller Software CDP Neighbor Report Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20202 \nPublished : May 7, 2025, 6:15 p.m. | 26\u00a0minutes ago \nDescription : A vulnerability in Cisco IOS XE Wireless Controller Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.  \n  \n This vulnerability is due to insufficient input validation of access point (AP) Cisco Discovery Protocol (CDP) neighbor reports when they are processed by the wireless controller. An attacker could exploit this vulnerability by sending a crafted CDP packet to an AP. A successful exploit could allow the attacker to cause an unexpected reload of the wireless controller that is managing the AP, resulting in a DoS condition that affects the wireless network. \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T21:31:46.000000Z"}, {"uuid": "734a1d8d-bf12-4a39-aa1e-22160ad4d8eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20200", "type": "seen", "source": "https://t.me/cvedetector/24752", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20200 - Cisco IOS XE Software CLI Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20200 \nPublished : May 7, 2025, 6:15 p.m. | 26\u00a0minutes ago \nDescription : A vulnerability\u00a0in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.  \n  \n This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.  \n  \n Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T21:31:53.000000Z"}, {"uuid": "de571e6b-aa20-4998-b06a-adbe5de23aa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20201", "type": "seen", "source": "https://t.me/cvedetector/24753", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20201 - Cisco IOS XE Software CLI Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20201 \nPublished : May 7, 2025, 6:15 p.m. | 26\u00a0minutes ago \nDescription : A vulnerability\u00a0in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device.  \n  \n This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions.  \n  \n Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T21:31:54.000000Z"}, {"uuid": "f2eb1052-31aa-4554-be8d-d7d4816f8d11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20204", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhhfwh5ljn2w", "content": "", "creation_timestamp": "2025-02-05T20:28:47.747579Z"}, {"uuid": "9f2c78bd-8f42-4337-ac90-18bc8aa11d8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20205", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhhfwhkvhq27", "content": "", "creation_timestamp": "2025-02-05T20:28:50.163345Z"}, {"uuid": "a0ca926b-35db-4695-9ab3-0c98388ff26f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20204", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952253513111136", "content": "", "creation_timestamp": "2025-02-05T16:36:40.142383Z"}, {"uuid": "81a44200-2478-4b34-8ec7-da29986d796e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20204", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113952255128702135", "content": "", "creation_timestamp": "2025-02-05T16:37:05.435223Z"}, {"uuid": "46ee545d-bde2-41d2-aeb2-b0bb24d62787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20205", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113952255128702135", "content": "", "creation_timestamp": "2025-02-05T16:37:05.484518Z"}, {"uuid": "4d00d743-3713-4347-9b83-d3997acad5d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20207", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113952255128702135", "content": "", "creation_timestamp": "2025-02-05T16:37:05.721927Z"}, {"uuid": "b3739c47-83f7-408a-b19f-398ef68b5f4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20207", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhhfwhy7aq27", "content": "", "creation_timestamp": "2025-02-05T20:28:52.612730Z"}, {"uuid": "ae46a938-22c1-4b3d-8adc-0d7473488394", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2020", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-124/", "content": "", "creation_timestamp": "2025-03-10T04:00:00.000000Z"}, {"uuid": "755b2ce3-466c-4d0d-ade2-c3565581467a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20206", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3ljri4gmves2t", "content": "", "creation_timestamp": "2025-03-07T07:24:56.567563Z"}, {"uuid": "3a0f3b88-72c3-48f2-9570-633a9ed54b1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20201", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lomdjtmy3xo2", "content": "", "creation_timestamp": "2025-05-07T21:26:26.684947Z"}, {"uuid": "2916e4d2-6f2c-4cd4-9daa-62f38763d829", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2020", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}, {"uuid": "90776e64-42c1-4f02-847b-a3d86f6eb823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20208", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "3e370c05-96c2-42e5-a036-c811bfde74a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20206", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "a66181d6-ac5c-4815-b71f-b3f364d1fb16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20200", "type": "seen", "source": "https://gist.github.com/EbonJaeger/2ba8ad95fbe2fa2ac2e44b74f6abfe47", "content": "", "creation_timestamp": "2025-09-19T18:51:31.000000Z"}, {"uuid": "75024a9d-f4d4-4789-b08c-ed833c4f858b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20209", "type": "seen", "source": "https://t.me/cvedetector/20161", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20209 - \"Cisco IKEv2 Denial of Service Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-20209 \nPublished : March 12, 2025, 4:15 p.m. | 2\u00a0hours, 58\u00a0minutes ago \nDescription : A vulnerability in the Internet Key Exchange version 2 (IKEv2) function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to prevent an affected device from processing any control plane UDP packets.\u00a0  \n  \nThis vulnerability is due to improper handling of malformed IKEv2 packets. An attacker could exploit this vulnerability by sending malformed IKEv2 packets to an affected device. A successful exploit could allow the attacker to prevent the affected device from processing any control plane UDP packets, resulting in a denial of service (DoS) condition.  \nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-12T20:23:15.000000Z"}]}