A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute a command injection attack on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have valid user credentials on the affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by entering crafted input as the argument of an affected CLI command. A successful exploit could allow the attacker to read and write files on the underlying operating system with the privileges of a non-root user account. File system access is limited to the permissions that are granted to that non-root user account.
History

Wed, 27 Aug 2025 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco nx-os
Cisco unified Computing System Manager
Vendors & Products Cisco
Cisco nx-os
Cisco unified Computing System Manager

Wed, 27 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 27 Aug 2025 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute a command injection attack on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have valid user credentials on the affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by entering crafted input as the argument of an affected CLI command. A successful exploit could allow the attacker to read and write files on the underlying operating system with the privileges of a non-root user account. File system access is limited to the permissions that are granted to that non-root user account.
Title Cisco NXOS Software Command Injection Vulnerability
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2025-08-27T16:23:35.656Z

Updated: 2025-08-27T18:25:03.052Z

Reserved: 2024-10-10T19:15:13.251Z

Link: CVE-2025-20292

cve-icon Vulnrichment

Updated: 2025-08-27T18:24:53.985Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-27T17:15:35.303

Modified: 2025-08-29T16:24:09.860

Link: CVE-2025-20292

cve-icon Redhat

No data.