CVE-2025-20118 (GCVE-0-2025-20118)
Vulnerability from cvelistv5 – Published: 2025-02-26 16:23 – Updated: 2025-03-03 19:03
VLAI?
Title
Cisco Application Policy Infrastructure Controller Authenticated Command Injection Due to Sensitive Disclosure Vulnerability
Summary
A vulnerability in the implementation of the internal system processes of Cisco APIC could allow an authenticated, local attacker to access sensitive information on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability is due to insufficient masking of sensitive information that is displayed through system CLI commands. An attacker could exploit this vulnerability by using reconnaissance techniques at the device CLI. A successful exploit could allow the attacker to access sensitive information on an affected device that could be used for additional attacks.
Severity ?
4.4 (Medium)
CWE
- CWE-212 - Improper Removal of Sensitive Information Before Storage or Transfer
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Application Policy Infrastructure Controller (APIC) |
Affected:
3.2(8d)
Affected: 3.2(1m) Affected: 3.2(5e) Affected: 4.1(2m) Affected: 3.2(41d) Affected: 3.2(3s) Affected: 4.0(3c) Affected: 4.1(1k) Affected: 3.2(4d) Affected: 4.2(2e) Affected: 4.2(3j) Affected: 4.2(3n) Affected: 4.0(1h) Affected: 4.1(1l) Affected: 3.2(9f) Affected: 4.2(3l) Affected: 4.2(2g) Affected: 3.2(7k) Affected: 3.2(9b) Affected: 3.2(3j) Affected: 4.1(2u) Affected: 4.2(1l) Affected: 4.1(1a) Affected: 4.0(3d) Affected: 3.2(4e) Affected: 4.1(1i) Affected: 3.2(5f) Affected: 3.2(1l) Affected: 4.2(1i) Affected: 4.1(2o) Affected: 4.2(1g) Affected: 4.1(2g) Affected: 4.2(2f) Affected: 3.2(6i) Affected: 3.2(3i) Affected: 3.2(3n) Affected: 4.1(2x) Affected: 3.2(5d) Affected: 4.2(3q) Affected: 4.1(1j) Affected: 4.1(2w) Affected: 3.2(2o) Affected: 3.2(3r) Affected: 4.0(2c) Affected: 4.1(2s) Affected: 3.2(7f) Affected: 3.2(3o) Affected: 3.2(2l) Affected: 4.2(1j) Affected: 4.2(4i) Affected: 3.2(9h) Affected: 5.0(1k) Affected: 4.2(4k) Affected: 5.0(1l) Affected: 5.0(2e) Affected: 4.2(4o) Affected: 4.2(4p) Affected: 5.0(2h) Affected: 4.2(5k) Affected: 4.2(5l) Affected: 4.2(5n) Affected: 5.1(1h) Affected: 4.2(6d) Affected: 5.1(2e) Affected: 4.2(6g) Affected: 4.2(6h) Affected: 5.1(3e) Affected: 3.2(10e) Affected: 4.2(6l) Affected: 4.2(7f) Affected: 5.1(4c) Affected: 4.2(6o) Affected: 5.2(1g) Affected: 5.2(2e) Affected: 4.2(7l) Affected: 3.2(10f) Affected: 5.2(2f) Affected: 5.2(2g) Affected: 4.2(7q) Affected: 5.2(2h) Affected: 5.2(3f) Affected: 5.2(3e) Affected: 5.2(3g) Affected: 4.2(7r) Affected: 4.2(7s) Affected: 5.2(4d) Affected: 5.2(4e) Affected: 4.2(7t) Affected: 5.2(5d) Affected: 3.2(10g) Affected: 5.2(5c) Affected: 6.0(1g) Affected: 4.2(7u) Affected: 5.2(5e) Affected: 5.2(4f) Affected: 5.2(6e) Affected: 6.0(1j) Affected: 5.2(6g) Affected: 5.2(7f) Affected: 4.2(7v) Affected: 5.2(7g) Affected: 6.0(2h) Affected: 4.2(7w) Affected: 5.2(6h) Affected: 5.2(4h) Affected: 5.2(8d) Affected: 6.0(2j) Affected: 5.2(8e) Affected: 6.0(3d) Affected: 6.0(3e) Affected: 5.2(8f) Affected: 5.2(8g) Affected: 5.3(1d) Affected: 5.2(8h) Affected: 6.0(4c) Affected: 5.3(2a) Affected: 5.2(8i) Affected: 6.0(5h) Affected: 5.3(2b) Affected: 6.0(3g) Affected: 6.0(5j) Affected: 5.3(2c) Affected: 6.0(6c) Affected: 6.1(1f) Affected: 6.0(7e) Affected: 5.3(2d) Affected: 6.0(8d) Affected: 5.3(2e) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20118",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-26T17:51:08.139382Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-03T19:03:28.886Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Application Policy Infrastructure Controller (APIC)",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.2(8d)"
},
{
"status": "affected",
"version": "3.2(1m)"
},
{
"status": "affected",
"version": "3.2(5e)"
},
{
"status": "affected",
"version": "4.1(2m)"
},
{
"status": "affected",
"version": "3.2(41d)"
},
{
"status": "affected",
"version": "3.2(3s)"
},
{
"status": "affected",
"version": "4.0(3c)"
},
{
"status": "affected",
"version": "4.1(1k)"
},
{
"status": "affected",
"version": "3.2(4d)"
},
{
"status": "affected",
"version": "4.2(2e)"
},
{
"status": "affected",
"version": "4.2(3j)"
},
{
"status": "affected",
"version": "4.2(3n)"
},
{
"status": "affected",
"version": "4.0(1h)"
},
{
"status": "affected",
"version": "4.1(1l)"
},
{
"status": "affected",
"version": "3.2(9f)"
},
{
"status": "affected",
"version": "4.2(3l)"
},
{
"status": "affected",
"version": "4.2(2g)"
},
{
"status": "affected",
"version": "3.2(7k)"
},
{
"status": "affected",
"version": "3.2(9b)"
},
{
"status": "affected",
"version": "3.2(3j)"
},
{
"status": "affected",
"version": "4.1(2u)"
},
{
"status": "affected",
"version": "4.2(1l)"
},
{
"status": "affected",
"version": "4.1(1a)"
},
{
"status": "affected",
"version": "4.0(3d)"
},
{
"status": "affected",
"version": "3.2(4e)"
},
{
"status": "affected",
"version": "4.1(1i)"
},
{
"status": "affected",
"version": "3.2(5f)"
},
{
"status": "affected",
"version": "3.2(1l)"
},
{
"status": "affected",
"version": "4.2(1i)"
},
{
"status": "affected",
"version": "4.1(2o)"
},
{
"status": "affected",
"version": "4.2(1g)"
},
{
"status": "affected",
"version": "4.1(2g)"
},
{
"status": "affected",
"version": "4.2(2f)"
},
{
"status": "affected",
"version": "3.2(6i)"
},
{
"status": "affected",
"version": "3.2(3i)"
},
{
"status": "affected",
"version": "3.2(3n)"
},
{
"status": "affected",
"version": "4.1(2x)"
},
{
"status": "affected",
"version": "3.2(5d)"
},
{
"status": "affected",
"version": "4.2(3q)"
},
{
"status": "affected",
"version": "4.1(1j)"
},
{
"status": "affected",
"version": "4.1(2w)"
},
{
"status": "affected",
"version": "3.2(2o)"
},
{
"status": "affected",
"version": "3.2(3r)"
},
{
"status": "affected",
"version": "4.0(2c)"
},
{
"status": "affected",
"version": "4.1(2s)"
},
{
"status": "affected",
"version": "3.2(7f)"
},
{
"status": "affected",
"version": "3.2(3o)"
},
{
"status": "affected",
"version": "3.2(2l)"
},
{
"status": "affected",
"version": "4.2(1j)"
},
{
"status": "affected",
"version": "4.2(4i)"
},
{
"status": "affected",
"version": "3.2(9h)"
},
{
"status": "affected",
"version": "5.0(1k)"
},
{
"status": "affected",
"version": "4.2(4k)"
},
{
"status": "affected",
"version": "5.0(1l)"
},
{
"status": "affected",
"version": "5.0(2e)"
},
{
"status": "affected",
"version": "4.2(4o)"
},
{
"status": "affected",
"version": "4.2(4p)"
},
{
"status": "affected",
"version": "5.0(2h)"
},
{
"status": "affected",
"version": "4.2(5k)"
},
{
"status": "affected",
"version": "4.2(5l)"
},
{
"status": "affected",
"version": "4.2(5n)"
},
{
"status": "affected",
"version": "5.1(1h)"
},
{
"status": "affected",
"version": "4.2(6d)"
},
{
"status": "affected",
"version": "5.1(2e)"
},
{
"status": "affected",
"version": "4.2(6g)"
},
{
"status": "affected",
"version": "4.2(6h)"
},
{
"status": "affected",
"version": "5.1(3e)"
},
{
"status": "affected",
"version": "3.2(10e)"
},
{
"status": "affected",
"version": "4.2(6l)"
},
{
"status": "affected",
"version": "4.2(7f)"
},
{
"status": "affected",
"version": "5.1(4c)"
},
{
"status": "affected",
"version": "4.2(6o)"
},
{
"status": "affected",
"version": "5.2(1g)"
},
{
"status": "affected",
"version": "5.2(2e)"
},
{
"status": "affected",
"version": "4.2(7l)"
},
{
"status": "affected",
"version": "3.2(10f)"
},
{
"status": "affected",
"version": "5.2(2f)"
},
{
"status": "affected",
"version": "5.2(2g)"
},
{
"status": "affected",
"version": "4.2(7q)"
},
{
"status": "affected",
"version": "5.2(2h)"
},
{
"status": "affected",
"version": "5.2(3f)"
},
{
"status": "affected",
"version": "5.2(3e)"
},
{
"status": "affected",
"version": "5.2(3g)"
},
{
"status": "affected",
"version": "4.2(7r)"
},
{
"status": "affected",
"version": "4.2(7s)"
},
{
"status": "affected",
"version": "5.2(4d)"
},
{
"status": "affected",
"version": "5.2(4e)"
},
{
"status": "affected",
"version": "4.2(7t)"
},
{
"status": "affected",
"version": "5.2(5d)"
},
{
"status": "affected",
"version": "3.2(10g)"
},
{
"status": "affected",
"version": "5.2(5c)"
},
{
"status": "affected",
"version": "6.0(1g)"
},
{
"status": "affected",
"version": "4.2(7u)"
},
{
"status": "affected",
"version": "5.2(5e)"
},
{
"status": "affected",
"version": "5.2(4f)"
},
{
"status": "affected",
"version": "5.2(6e)"
},
{
"status": "affected",
"version": "6.0(1j)"
},
{
"status": "affected",
"version": "5.2(6g)"
},
{
"status": "affected",
"version": "5.2(7f)"
},
{
"status": "affected",
"version": "4.2(7v)"
},
{
"status": "affected",
"version": "5.2(7g)"
},
{
"status": "affected",
"version": "6.0(2h)"
},
{
"status": "affected",
"version": "4.2(7w)"
},
{
"status": "affected",
"version": "5.2(6h)"
},
{
"status": "affected",
"version": "5.2(4h)"
},
{
"status": "affected",
"version": "5.2(8d)"
},
{
"status": "affected",
"version": "6.0(2j)"
},
{
"status": "affected",
"version": "5.2(8e)"
},
{
"status": "affected",
"version": "6.0(3d)"
},
{
"status": "affected",
"version": "6.0(3e)"
},
{
"status": "affected",
"version": "5.2(8f)"
},
{
"status": "affected",
"version": "5.2(8g)"
},
{
"status": "affected",
"version": "5.3(1d)"
},
{
"status": "affected",
"version": "5.2(8h)"
},
{
"status": "affected",
"version": "6.0(4c)"
},
{
"status": "affected",
"version": "5.3(2a)"
},
{
"status": "affected",
"version": "5.2(8i)"
},
{
"status": "affected",
"version": "6.0(5h)"
},
{
"status": "affected",
"version": "5.3(2b)"
},
{
"status": "affected",
"version": "6.0(3g)"
},
{
"status": "affected",
"version": "6.0(5j)"
},
{
"status": "affected",
"version": "5.3(2c)"
},
{
"status": "affected",
"version": "6.0(6c)"
},
{
"status": "affected",
"version": "6.1(1f)"
},
{
"status": "affected",
"version": "6.0(7e)"
},
{
"status": "affected",
"version": "5.3(2d)"
},
{
"status": "affected",
"version": "6.0(8d)"
},
{
"status": "affected",
"version": "5.3(2e)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the implementation of the internal system processes of Cisco APIC could allow an authenticated, local attacker to access sensitive information on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to insufficient masking of sensitive information that is displayed through system CLI commands. An attacker could exploit this vulnerability by using reconnaissance techniques at the device CLI. A successful exploit could allow the attacker to access sensitive information on an affected device that could be used for additional attacks."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-212",
"description": "Improper Removal of Sensitive Information Before Storage or Transfer",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-26T17:13:05.215Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-apic-multi-vulns-9ummtg5",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5"
}
],
"source": {
"advisory": "cisco-sa-apic-multi-vulns-9ummtg5",
"defects": [
"CSCwk18864"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Application Policy Infrastructure Controller Authenticated Command Injection Due to Sensitive Disclosure Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20118",
"datePublished": "2025-02-26T16:23:28.132Z",
"dateReserved": "2024-10-10T19:15:13.211Z",
"dateUpdated": "2025-03-03T19:03:28.886Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-20118\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2025-02-26T17:15:22.723\",\"lastModified\":\"2025-07-31T17:38:18.293\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the implementation of the internal system processes of Cisco APIC could allow an authenticated, local attacker to access sensitive information on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.\\r\\n\\r\\nThis vulnerability is due to insufficient masking of sensitive information that is displayed through system CLI commands. An attacker could exploit this vulnerability by using reconnaissance techniques at the device CLI. A successful exploit could allow the attacker to access sensitive information on an affected device that could be used for additional attacks.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la implementaci\u00f3n de los procesos internos del sistema de Cisco APIC podr\u00eda permitir que un atacante local autenticado acceda a informaci\u00f3n confidencial en un dispositivo afectado. Para explotar esta vulnerabilidad, el atacante debe tener credenciales administrativas v\u00e1lidas. Esta vulnerabilidad se debe a un enmascaramiento insuficiente de la informaci\u00f3n confidencial que se muestra a trav\u00e9s de los comandos de la interfaz de l\u00ednea de comandos del sistema. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el uso de t\u00e9cnicas de reconocimiento en la interfaz de l\u00ednea de comandos del dispositivo. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante acceder a informaci\u00f3n confidencial en un dispositivo afectado que podr\u00eda usarse para ataques adicionales.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-212\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(1l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B98F6DE0-E0BB-4964-8A05-C65F5165621B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(1m\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D70E3895-DCB3-4172-B98C-6E40F0A4F418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(2l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD7459-DE32-4CCD-8FD9-E51E78F5E6A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(2o\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB7047CE-3246-4148-A976-816F52955EA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(3i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"195681EC-2C51-4E03-9D6B-98775F91CCDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(3j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2159857F-B8BA-4C08-B3B0-F94D391A6396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(3n\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3110702B-17B0-4CC0-ACF1-373E46B434B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(3o\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4DC07AC-B0E9-4963-843E-FFA9461FFBB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(3r\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99D0E93D-8D70-4232-85B5-916DF9094FC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(3s\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43499579-9B0B-439E-8E75-18E7B42799FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(4d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7F5A4B6-B2E7-419F-A051-CBA3EC4A36C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(4e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41FEF58C-6E55-4B50-A26A-0D6CC162572B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(5d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD7A2FE-4858-4929-98CF-D830D5ADC570\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(5e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6ABA87-08F5-4C89-B0A2-D209B6305E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(5f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01076AAB-79F9-40B8-BE1F-411EED87867A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(6i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76E4E4F2-9567-471E-AC73-5CD6AD338C95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(7f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEAD3085-3271-4E28-9E55-2ED813D796F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(7k\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80ADB11A-4D8C-4C2D-A483-E5BCD0B52B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(8d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF518C44-E1F8-4443-9D73-D620158E7946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(9b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"569D4548-EE9D-4F33-A6EE-21A7ADF2514E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(9f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F2A714-DA33-449E-9C99-C8D8C15647D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(9h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A36D5184-55D1-4CBA-91BC-5E077FB07E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(10e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D155016D-6988-4489-A4A1-BFDFB8F702A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(10f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C036D5F-67EE-45CE-8D47-2BF483A14922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(10g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B468C9AE-396E-445B-AC5D-EAB1BB8EDFEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\\\(41d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3686F336-5D02-4984-B465-762EA7AB747D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\\\(1h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA2A1A67-093B-4B8D-92EC-74BBDEDC91AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\\\(2c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6D53DB7-C376-481B-9FF5-745290EE2F4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\\\(3c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A59205CF-AB56-4902-BE58-2823B432A32C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\\\(3d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF203A26-8EE3-4570-89EB-2C06F228222D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(1a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0530224D-F85F-41CD-ADF9-29DF060C3BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(1i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"807B4B19-7346-4F9A-AC07-ACC9F1AE145E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(1j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5775342D-C7A7-454E-BE3C-D0BF0C045C20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(1k\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9496DBE9-0688-49F4-9A13-6AB427BB3663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(1l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DFEF7C4-26F5-4F58-9063-811247E40EAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9863BBC-56C8-44FC-B30A-5D12C74B3779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2m\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E54667F-863C-4FC7-8DF2-5515D6766B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2o\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D1B627-4C61-4A86-8C39-D5C1152F0EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2s\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"632F2791-A9E9-4902-9F5F-51F5D8A025AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2u\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"511B92C9-9E6D-4919-9CF3-BCAE7802B5A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2w\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69D2E5F9-6A86-4F9A-9E71-BA682301D1AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\\\(2x\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"706A76CD-F18D-4B95-B996-B0160A91CD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(1g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46CDDD7F-018A-4AD7-BBE2-F8602F2BA931\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(1i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C47A6A0E-84B9-4DE4-98EB-1065E18C2D2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(1j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA157F60-606D-4A5C-8437-D7970C7FA8D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(1l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87ED09DD-8305-4CF9-B174-644AC585C92B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(2e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF98D3C8-A0C6-46EA-9B62-3850868B36A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(2f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD24A82-0BF7-4B90-BA36-BD6AB204304B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(2g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA99D3C-21C0-4432-AE97-8F750C8D4D2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(3j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"095A0E88-E216-4070-A458-8ED6041469B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(3l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9E0FDA1-5C75-4683-B24C-4486EC7E3E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(3n\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCD0F519-2B3B-4AF1-BC30-12B8F5F0F54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(3q\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8376ED28-4A53-4E54-94C2-B1C2A744729B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(4i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"961D987E-71F7-4CF4-BDAA-0B6ABDEF05D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(4k\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A584271A-0F2B-4B55-A14B-FA55BC8BD981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(4o\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D87AD83-B69E-4C79-9362-984FBD4096B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(4p\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3930A258-9C03-49E0-B935-136847EF05E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(5k\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7821B4A2-FFF5-4E2E-B360-9000DD0A1980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(5l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08254391-0BEC-4110-8AAF-44B66E76569B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(5n\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A8CCC02-5269-47CA-9DEE-FB9DF0AEAC93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(6d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB6B9B5-9B85-49FC-83F6-3CD2C3B92D0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(6g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5627AF1-FB65-44F1-A7E2-98D6B2767887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(6h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF23AD6E-B875-4895-BC82-EA6305927487\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(6l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8418157-E12F-4F97-9FAE-601C9BE25D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(6o\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"270B4C0E-796A-43B3-B3BE-D8C0DF0C0F3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9FDB03C-8B6F-46B2-930A-BD105E41D2FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA2AA37-6DA9-43D8-9D21-E1ECED85A509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7q\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5088B144-3349-4E6F-8978-B96FA7AC420F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7r\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08791B2A-6B2F-4BAE-9E9B-0B2E5F8B610D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7s\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3067079-4CE4-4F29-BFDB-2CDACD003BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7t\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CC183AB-16F7-4C43-8F2F-F7508005A82B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7u\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB58D50B-68C3-40A3-8E0C-151511E22978\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7v\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"693E0E3A-0AA3-4556-930F-79A13A4506ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\\\(7w\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0875EE60-A0CE-44C2-AE3A-42BF383BA710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\\\(1k\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B412D14-9F6F-4608-8CF8-3AE74A694BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\\\(1l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB19FC9F-C52E-48B5-B6F5-5B39F016DC18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\\\(2e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"091E80DF-2FCF-466D-8D41-A6F5513C0180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\\\(2h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BBC0EE-5C05-4E88-95CC-2FEB7ABE95C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\\\(1h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7587DDE3-79E4-4A7A-B02D-D407B99B6CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\\\(2e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C4E68E4-7893-4DC3-9464-03689AEBB2BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\\\(3e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DE195AC-67AA-45CD-8F81-96B5B4859869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\\\(4c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35BFCBA5-DDA2-4DC6-BD12-CF1D58CB73F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(1g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92295C80-3DEB-47C8-A26F-CFA156C88B34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(2e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9A687B-642A-4646-A85C-8F5C41B8CD15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(2f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697D5222-9FDC-430A-B4AD-18C43606B59B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(2g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ABB3875-2D9B-4EF5-9DF5-0E7C2E180167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(2h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D660DE6-B3F1-498D-9F0C-919D4FD81913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(3e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BEE0A24-B301-4693-965B-9EDF4FB3E652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(3f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"832E8780-1C4F-42EE-B3DB-C36D5C39330A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(3g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA0E35AD-664F-4A1B-A651-9A6D6699133E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(4d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B487C5E8-FCDB-4EDC-85A0-69B9143B8C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(4e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1DA2E2F-D519-46E1-AF0F-1B068EE8CF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(4f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19E2370A-EDBD-4F39-9AA2-BB1B48DBC6F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(4h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13102E2-A4B5-4E8E-AFBF-7D2824DF07D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(5c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E304F25-6F50-4C86-B488-F3CB80601FC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(5d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A56BE783-4995-4EE9-90C8-6BAE73588A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(5e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE12D57D-B08E-46DE-9048-F608B1D0432A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(6e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DD76D9-2703-40AF-B154-9F3A268473D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(6g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AFA2721-32D2-4877-BCAB-8E965AAB0B28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(6h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC4FB4EB-87BE-4A1B-AB68-9B12F2372090\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(7f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8638CF95-3422-4F8D-AE5D-FF7F76BFC456\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(7g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"857F16AE-D927-44E8-B268-F7A2FC4503B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(8d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B178BD85-E906-4D5E-9710-22C394038EFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(8e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC7D76A6-9CEF-4E74-A991-37725A46A045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(8f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"224C813A-61E2-4FE7-A012-8C50D90CB633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(8g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D57E315-9795-4AB2-A36D-1979AA3B65E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(8h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"010B771A-30B2-4892-B028-08C9AEC170BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\\\(8i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94AEA808-C9C3-4C54-A717-6FB3BC4A32EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\\\(1d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA3ED35C-255F-43D3-A9A9-81AAEA1F3AFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\\\(2a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B1284FC-805B-4C57-931A-BA422A648777\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\\\(2b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD6BCF2-81B0-4118-9C34-55AEFFAB62BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\\\(2c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CCD0606-F883-469B-BA82-B372B2F33D8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\\\(2d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F69DA2D-379F-437A-9284-B5C98BC9F94D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\\\(2e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D1FF93B-35F0-4CA9-8A7F-4B4B732A81D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(1g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7699F8E-2A17-421E-8078-7EBECE7C2768\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(1j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C01F1006-7409-459F-A947-7D68D483CCC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(2h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7839A222-2CC0-495D-97E6-2421BFB0B948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(2j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F64391-5096-478C-A955-169F4AEBDC55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(3d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF29E5EB-2497-4136-9BC7-7E75A6180245\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(3e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B7CC4CE-1FF6-45BB-AAC7-367593586AB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(3g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64CFF745-E48F-44B9-8C22-12644F0FF06E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(4c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97954FE9-2CBF-4016-8FDD-CE7423A65BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(5h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6714932-BC33-41D0-8032-7ED387C6F80C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(5j\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23C425D3-CF4A-4D2D-9FD6-E7B9A9927ED7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(6c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91678F6-6BF7-4158-9FBD-6C439BE54D8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(7e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"291A6AB2-121A-49AE-94E0-C9A76A87D48A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\\\(8d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C4E7075-9EFE-4573-A5E5-F15E622A16A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.1\\\\(1f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B3DA1C0-01DB-4773-81EC-A8574030FC59\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"Cisco Application Policy Infrastructure Controller Authenticated Command Injection Due to Sensitive Disclosure Vulnerability\", \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 4.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the implementation of the internal system processes of Cisco APIC could allow an authenticated, local attacker to access sensitive information on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.\\r\\n\\r\\nThis vulnerability is due to insufficient masking of sensitive information that is displayed through system CLI commands. An attacker could exploit this vulnerability by using reconnaissance techniques at the device CLI. A successful exploit could allow the attacker to access sensitive information on an affected device that could be used for additional attacks.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5\", \"name\": \"cisco-sa-apic-multi-vulns-9ummtg5\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory.\"}], \"source\": {\"advisory\": \"cisco-sa-apic-multi-vulns-9ummtg5\", \"discovery\": \"EXTERNAL\", \"defects\": [\"CSCwk18864\"]}, \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Improper Removal of Sensitive Information Before Storage or Transfer\", \"type\": \"cwe\", \"cweId\": \"CWE-212\"}]}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Application Policy Infrastructure Controller (APIC)\", \"versions\": [{\"version\": \"3.2(8d)\", \"status\": \"affected\"}, {\"version\": \"3.2(1m)\", \"status\": \"affected\"}, {\"version\": \"3.2(5e)\", \"status\": \"affected\"}, {\"version\": \"4.1(2m)\", \"status\": \"affected\"}, {\"version\": \"3.2(41d)\", \"status\": \"affected\"}, {\"version\": \"3.2(3s)\", \"status\": \"affected\"}, {\"version\": \"4.0(3c)\", \"status\": \"affected\"}, {\"version\": \"4.1(1k)\", \"status\": \"affected\"}, {\"version\": \"3.2(4d)\", \"status\": \"affected\"}, {\"version\": \"4.2(2e)\", \"status\": \"affected\"}, {\"version\": \"4.2(3j)\", \"status\": \"affected\"}, {\"version\": \"4.2(3n)\", \"status\": \"affected\"}, {\"version\": \"4.0(1h)\", \"status\": \"affected\"}, {\"version\": \"4.1(1l)\", \"status\": \"affected\"}, {\"version\": \"3.2(9f)\", \"status\": \"affected\"}, {\"version\": \"4.2(3l)\", \"status\": \"affected\"}, {\"version\": \"4.2(2g)\", \"status\": \"affected\"}, {\"version\": \"3.2(7k)\", \"status\": \"affected\"}, {\"version\": \"3.2(9b)\", \"status\": \"affected\"}, {\"version\": \"3.2(3j)\", \"status\": \"affected\"}, {\"version\": \"4.1(2u)\", \"status\": \"affected\"}, {\"version\": \"4.2(1l)\", \"status\": \"affected\"}, {\"version\": \"4.1(1a)\", \"status\": \"affected\"}, {\"version\": \"4.0(3d)\", \"status\": \"affected\"}, {\"version\": \"3.2(4e)\", \"status\": \"affected\"}, {\"version\": \"4.1(1i)\", \"status\": \"affected\"}, {\"version\": \"3.2(5f)\", \"status\": \"affected\"}, {\"version\": \"3.2(1l)\", \"status\": \"affected\"}, {\"version\": \"4.2(1i)\", \"status\": \"affected\"}, {\"version\": \"4.1(2o)\", \"status\": \"affected\"}, {\"version\": \"4.2(1g)\", \"status\": \"affected\"}, {\"version\": \"4.1(2g)\", \"status\": \"affected\"}, {\"version\": \"4.2(2f)\", \"status\": \"affected\"}, {\"version\": \"3.2(6i)\", \"status\": \"affected\"}, {\"version\": \"3.2(3i)\", \"status\": \"affected\"}, {\"version\": \"3.2(3n)\", \"status\": \"affected\"}, {\"version\": \"4.1(2x)\", \"status\": \"affected\"}, {\"version\": \"3.2(5d)\", \"status\": \"affected\"}, {\"version\": \"4.2(3q)\", \"status\": \"affected\"}, {\"version\": \"4.1(1j)\", \"status\": \"affected\"}, {\"version\": \"4.1(2w)\", \"status\": \"affected\"}, {\"version\": \"3.2(2o)\", \"status\": \"affected\"}, {\"version\": \"3.2(3r)\", \"status\": \"affected\"}, {\"version\": \"4.0(2c)\", \"status\": \"affected\"}, {\"version\": \"4.1(2s)\", \"status\": \"affected\"}, {\"version\": \"3.2(7f)\", \"status\": \"affected\"}, {\"version\": \"3.2(3o)\", \"status\": \"affected\"}, {\"version\": \"3.2(2l)\", \"status\": \"affected\"}, {\"version\": \"4.2(1j)\", \"status\": \"affected\"}, {\"version\": \"4.2(4i)\", \"status\": \"affected\"}, {\"version\": \"3.2(9h)\", \"status\": \"affected\"}, {\"version\": \"5.0(1k)\", \"status\": \"affected\"}, {\"version\": \"4.2(4k)\", \"status\": \"affected\"}, {\"version\": \"5.0(1l)\", \"status\": \"affected\"}, {\"version\": \"5.0(2e)\", \"status\": \"affected\"}, {\"version\": \"4.2(4o)\", \"status\": \"affected\"}, {\"version\": \"4.2(4p)\", \"status\": \"affected\"}, {\"version\": \"5.0(2h)\", \"status\": \"affected\"}, {\"version\": \"4.2(5k)\", \"status\": \"affected\"}, {\"version\": \"4.2(5l)\", \"status\": \"affected\"}, {\"version\": \"4.2(5n)\", \"status\": \"affected\"}, {\"version\": \"5.1(1h)\", \"status\": \"affected\"}, {\"version\": \"4.2(6d)\", \"status\": \"affected\"}, {\"version\": \"5.1(2e)\", \"status\": \"affected\"}, {\"version\": \"4.2(6g)\", \"status\": \"affected\"}, {\"version\": \"4.2(6h)\", \"status\": \"affected\"}, {\"version\": \"5.1(3e)\", \"status\": \"affected\"}, {\"version\": \"3.2(10e)\", \"status\": \"affected\"}, {\"version\": \"4.2(6l)\", \"status\": \"affected\"}, {\"version\": \"4.2(7f)\", \"status\": \"affected\"}, {\"version\": \"5.1(4c)\", \"status\": \"affected\"}, {\"version\": \"4.2(6o)\", \"status\": \"affected\"}, {\"version\": \"5.2(1g)\", \"status\": \"affected\"}, {\"version\": \"5.2(2e)\", \"status\": \"affected\"}, {\"version\": \"4.2(7l)\", \"status\": \"affected\"}, {\"version\": \"3.2(10f)\", \"status\": \"affected\"}, {\"version\": \"5.2(2f)\", \"status\": \"affected\"}, {\"version\": \"5.2(2g)\", \"status\": \"affected\"}, {\"version\": \"4.2(7q)\", \"status\": \"affected\"}, {\"version\": \"5.2(2h)\", \"status\": \"affected\"}, {\"version\": \"5.2(3f)\", \"status\": \"affected\"}, {\"version\": \"5.2(3e)\", \"status\": \"affected\"}, {\"version\": \"5.2(3g)\", \"status\": \"affected\"}, {\"version\": \"4.2(7r)\", \"status\": \"affected\"}, {\"version\": \"4.2(7s)\", \"status\": \"affected\"}, {\"version\": \"5.2(4d)\", \"status\": \"affected\"}, {\"version\": \"5.2(4e)\", \"status\": \"affected\"}, {\"version\": \"4.2(7t)\", \"status\": \"affected\"}, {\"version\": \"5.2(5d)\", \"status\": \"affected\"}, {\"version\": \"3.2(10g)\", \"status\": \"affected\"}, {\"version\": \"5.2(5c)\", \"status\": \"affected\"}, {\"version\": \"6.0(1g)\", \"status\": \"affected\"}, {\"version\": \"4.2(7u)\", \"status\": \"affected\"}, {\"version\": \"5.2(5e)\", \"status\": \"affected\"}, {\"version\": \"5.2(4f)\", \"status\": \"affected\"}, {\"version\": \"5.2(6e)\", \"status\": \"affected\"}, {\"version\": \"6.0(1j)\", \"status\": \"affected\"}, {\"version\": \"5.2(6g)\", \"status\": \"affected\"}, {\"version\": \"5.2(7f)\", \"status\": \"affected\"}, {\"version\": \"4.2(7v)\", \"status\": \"affected\"}, {\"version\": \"5.2(7g)\", \"status\": \"affected\"}, {\"version\": \"6.0(2h)\", \"status\": \"affected\"}, {\"version\": \"4.2(7w)\", \"status\": \"affected\"}, {\"version\": \"5.2(6h)\", \"status\": \"affected\"}, {\"version\": \"5.2(4h)\", \"status\": \"affected\"}, {\"version\": \"5.2(8d)\", \"status\": \"affected\"}, {\"version\": \"6.0(2j)\", \"status\": \"affected\"}, {\"version\": \"5.2(8e)\", \"status\": \"affected\"}, {\"version\": \"6.0(3d)\", \"status\": \"affected\"}, {\"version\": \"6.0(3e)\", \"status\": \"affected\"}, {\"version\": \"5.2(8f)\", \"status\": \"affected\"}, {\"version\": \"5.2(8g)\", \"status\": \"affected\"}, {\"version\": \"5.3(1d)\", \"status\": \"affected\"}, {\"version\": \"5.2(8h)\", \"status\": \"affected\"}, {\"version\": \"6.0(4c)\", \"status\": \"affected\"}, {\"version\": \"5.3(2a)\", \"status\": \"affected\"}, {\"version\": \"5.2(8i)\", \"status\": \"affected\"}, {\"version\": \"6.0(5h)\", \"status\": \"affected\"}, {\"version\": \"5.3(2b)\", \"status\": \"affected\"}, {\"version\": \"6.0(3g)\", \"status\": \"affected\"}, {\"version\": \"6.0(5j)\", \"status\": \"affected\"}, {\"version\": \"5.3(2c)\", \"status\": \"affected\"}, {\"version\": \"6.0(6c)\", \"status\": \"affected\"}, {\"version\": \"6.1(1f)\", \"status\": \"affected\"}, {\"version\": \"6.0(7e)\", \"status\": \"affected\"}, {\"version\": \"5.3(2d)\", \"status\": \"affected\"}, {\"version\": \"6.0(8d)\", \"status\": \"affected\"}, {\"version\": \"5.3(2e)\", \"status\": \"affected\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2025-02-26T17:13:05.215Z\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-20118\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-26T17:51:08.139382Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-26T18:41:15.015Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2025-20118\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"cisco\", \"dateReserved\": \"2024-10-10T19:15:13.211Z\", \"datePublished\": \"2025-02-26T16:23:28.132Z\", \"dateUpdated\": \"2025-03-03T19:03:28.886Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…