PT-2025-11096 · Cisco · Cisco Ios Xr
Alessandro Ruggieri
+1
·
Published
2025-03-12
·
Updated
2025-07-31
·
CVE-2025-20138
8.8
High
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Cisco IOS XR Software (affected versions not specified)
**Description:**
A vulnerability exists in the Command Line Interface (CLI) of Cisco IOS XR Software due to insufficient validation of user-supplied arguments passed to specific CLI commands. This allows an authenticated, local attacker with low privileges to execute arbitrary commands as root on the underlying operating system. Successful exploitation could lead to privilege escalation and complete system compromise.
**Recommendations:**
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
DoS
LPE
OS Command Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 21
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-priv-esc-GFQjxvOF · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-04306 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-20138 · Security Note
- https://twitter.com/huntingjacq/status/1901048698291056859 · Twitter Post
- https://twitter.com/Dinosn/status/1900032407362797815 · Twitter Post
- https://twitter.com/TheSecMaster1/status/1901854195516645794 · Twitter Post
- https://twitter.com/adriananglin/status/1900155284267401390 · Twitter Post
- https://twitter.com/the_yellow_fall/status/1900023208293916890 · Twitter Post
- https://t.me/cvedetector/20163 · Telegram Post
- https://twitter.com/TweetThreatNews/status/1900291664398143799 · Twitter Post
- https://twitter.com/IM_SAJJAD_/status/1900200627084681378 · Twitter Post
- https://twitter.com/CveFindCom/status/1899860881036488850 · Twitter Post
- https://t.me/cveNotify/130440 · Telegram Post
- https://t.me/pentestingnews/57814 · Telegram Post
- https://twitter.com/gbhackers_news/status/1900055384460845388 · Twitter Post