A vulnerability in the CLI of multiple Cisco Unified Communications products could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user.
This vulnerability is due to improper validation of user-supplied command arguments. An attacker could exploit this vulnerability by executing crafted commands on the CLI of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. To exploit this vulnerability, the attacker must have valid administrative credentials.
References
| Link | Resource |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vos-command-inject-65s2UCYy | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
No history.
Information
Published : 2025-06-04 17:15
Updated : 2025-07-31 15:02
NVD link : CVE-2025-20278
Mitre link : CVE-2025-20278
CVE.ORG link : CVE-2025-20278
JSON object : View
Products Affected
cisco
- socialminer
- unified_contact_center_express
- virtualized_voice_browser
- finesse
- unified_communications_manager
- unified_communications_manager_im_and_presence_service
- unified_intelligence_center
- unity_connection
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
