fkie_cve-2025-20181
Vulnerability from fkie_nvd
Published
2025-05-07 18:15
Modified
2025-08-04 18:51
Summary
A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time. Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
Impacted products
Vendor Product Version
cisco ios 15.0\(1\)ex
cisco ios 15.0\(1\)ey
cisco ios 15.0\(1\)ey1
cisco ios 15.0\(1\)ey2
cisco ios 15.0\(1\)xo
cisco ios 15.0\(1\)xo1
cisco ios 15.0\(2\)ex
cisco ios 15.0\(2\)ex1
cisco ios 15.0\(2\)ex2
cisco ios 15.0\(2\)ex3
cisco ios 15.0\(2\)ex4
cisco ios 15.0\(2\)ex5
cisco ios 15.0\(2\)ex8
cisco ios 15.0\(2\)ex10
cisco ios 15.0\(2\)ex11
cisco ios 15.0\(2\)ex12
cisco ios 15.0\(2\)ex13
cisco ios 15.0\(2\)se8
cisco ios 15.0\(2\)sqd
cisco ios 15.0\(2\)sqd1
cisco ios 15.0\(2\)sqd2
cisco ios 15.0\(2\)sqd3
cisco ios 15.0\(2\)sqd4
cisco ios 15.0\(2\)sqd5
cisco ios 15.0\(2\)sqd6
cisco ios 15.0\(2\)sqd7
cisco ios 15.0\(2\)sqd8
cisco ios 15.0\(2\)xo
cisco ios 15.0\(2a\)ex5
cisco ios 15.2\(2\)e
cisco ios 15.2\(2\)e1
cisco ios 15.2\(2\)e2
cisco ios 15.2\(2\)e3
cisco ios 15.2\(2\)e4
cisco ios 15.2\(2\)e5
cisco ios 15.2\(2\)e5a
cisco ios 15.2\(2\)e5b
cisco ios 15.2\(2\)e6
cisco ios 15.2\(2\)e7
cisco ios 15.2\(2\)e8
cisco ios 15.2\(2\)e9
cisco ios 15.2\(2\)e10
cisco ios 15.2\(2a\)e1
cisco ios 15.2\(2a\)e2
cisco ios 15.2\(3\)e
cisco ios 15.2\(3\)e1
cisco ios 15.2\(3\)e2
cisco ios 15.2\(3\)e3
cisco ios 15.2\(3\)e4
cisco ios 15.2\(3a\)e
cisco ios 15.2\(4\)e
cisco ios 15.2\(4\)e1
cisco ios 15.2\(4\)e2
cisco ios 15.2\(4\)e3
cisco ios 15.2\(4\)e4
cisco ios 15.2\(4\)e5
cisco ios 15.2\(4\)e6
cisco ios 15.2\(4\)e7
cisco ios 15.2\(4\)e8
cisco ios 15.2\(4\)e9
cisco ios 15.2\(4\)e10
cisco ios 15.2\(4\)e10a
cisco ios 15.2\(4\)e10d
cisco ios 15.2\(4\)ea7
cisco ios 15.2\(4\)ea8
cisco ios 15.2\(4\)ea9
cisco ios 15.2\(4\)ea9a
cisco ios 15.2\(5\)e
cisco ios 15.2\(5\)e1
cisco ios 15.2\(5\)e2
cisco ios 15.2\(5b\)e
cisco ios 15.2\(6\)e
cisco ios 15.2\(6\)e0a
cisco ios 15.2\(6\)e0c
cisco ios 15.2\(6\)e1
cisco ios 15.2\(6\)e2
cisco ios 15.2\(6\)e2a
cisco ios 15.2\(6\)e2b
cisco ios 15.2\(6\)e3
cisco ios 15.2\(6\)eb
cisco ios 15.2\(7\)e
cisco ios 15.2\(7\)e0a
cisco ios 15.2\(7\)e0b
cisco ios 15.2\(7\)e0s
cisco ios 15.2\(7\)e1
cisco ios 15.2\(7\)e1a
cisco ios 15.2\(7\)e2
cisco ios 15.2\(7\)e2a
cisco ios 15.2\(7\)e3
cisco ios 15.2\(7\)e3k
cisco ios 15.2\(7\)e4
cisco ios 15.2\(7\)e5
cisco ios 15.2\(7\)e6
cisco ios 15.2\(7\)e7
cisco ios 15.2\(7\)e8
cisco ios 15.2\(7\)e9
cisco ios 15.2\(7\)e10
cisco ios 15.2\(7a\)e0b
cisco ios 15.2\(7b\)e0b
cisco ios 15.2\(8\)e
cisco ios 15.2\(8\)e1
cisco ios 15.2\(8\)e2
cisco ios 15.2\(8\)e3
cisco ios 15.2\(8\)e4
cisco ios 15.2\(8\)e5
cisco ios 15.2\(8\)e6
cisco catalyst_2960cx-8pc-l -
cisco catalyst_2960cx-8tc-l -
cisco catalyst_2960x-24pd-l -
cisco catalyst_2960x-24ps-l -
cisco catalyst_2960x-24psq-l -
cisco catalyst_2960x-24psq-l_cool -
cisco catalyst_2960x-24td-l -
cisco catalyst_2960x-24ts-l -
cisco catalyst_2960x-24ts-ll -
cisco catalyst_2960x-48fpd-l -
cisco catalyst_2960x-48fps-l -
cisco catalyst_2960x-48lpd-l -
cisco catalyst_2960x-48lps-l -
cisco catalyst_2960x-48td-l -
cisco catalyst_2960x-48ts-l -
cisco catalyst_2960x-48ts-ll -
cisco catalyst_2960xr-24pd-i -
cisco catalyst_2960xr-24pd-l -
cisco catalyst_2960xr-24ps-i -
cisco catalyst_2960xr-24ps-l -
cisco catalyst_2960xr-24td-i -
cisco catalyst_2960xr-24td-l -
cisco catalyst_2960xr-24ts-i -
cisco catalyst_2960xr-24ts-l -
cisco catalyst_2960xr-48fpd-i -
cisco catalyst_2960xr-48fpd-l -
cisco catalyst_2960xr-48fps-i -
cisco catalyst_2960xr-48fps-l -
cisco catalyst_2960xr-48lpd-i -
cisco catalyst_2960xr-48lpd-l -
cisco catalyst_2960xr-48lps-i -
cisco catalyst_2960xr-48lps-l -
cisco catalyst_2960xr-48td-i -
cisco catalyst_2960xr-48td-l -
cisco catalyst_2960xr-48ts-i -
cisco catalyst_2960xr-48ts-l -
cisco catalyst_3560cx-12pc-s -
cisco catalyst_3560cx-12pd-s -
cisco catalyst_3560cx-12tc-s -
cisco catalyst_3560cx-8pc-s -
cisco catalyst_3560cx-8pt-s -
cisco catalyst_3560cx-8tc-s -
cisco catalyst_3560cx-8xpd-s -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ex:*:*:*:*:*:*:*",
              "matchCriteriaId": "189B0C7C-D794-43EB-A6C6-F29C4B9623A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*",
              "matchCriteriaId": "28722F17-AF23-4435-AF9B-996798ACF2C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
              "matchCriteriaId": "587450DF-77E4-4320-9191-383EBE5A6CB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
              "matchCriteriaId": "C965E814-7ABE-4C45-8EA8-B6818BC213F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4556022D-5B0C-4F7A-868C-9EC01F716D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
              "matchCriteriaId": "49229E8B-19ED-4E5E-AA2E-F699C033F4A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9A4AC61-4386-4218-91B7-6CE776D8050B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
              "matchCriteriaId": "59403A6B-3488-4F81-BE3C-A06AF1731B99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
              "matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D15A929-0C2B-4C3D-99E4-0E7D46217216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D00EB0E-92D3-4C5B-B107-730B47BD6E01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7F6A52-9AA9-4441-A137-7EE3470C155C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex13:*:*:*:*:*:*:*",
              "matchCriteriaId": "92CEEA13-0B40-4203-8BAE-09374C9B1FE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
              "matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D39E1ED-2F67-4116-9BF5-44CA8EF9A016",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd1:*:*:*:*:*:*:*",
              "matchCriteriaId": "729613AF-4C56-4514-9ECD-6A466C278E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd2:*:*:*:*:*:*:*",
              "matchCriteriaId": "368F2F9E-FD52-4A74-8378-DF246252B745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E452976-8876-40D7-8880-29197DB5457A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE5C762-5329-47E9-8D0C-C0A546AC24CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D93F335-8058-45BA-8653-9F3E4A5FA28E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF152F35-32C6-4C2A-BC91-90AAE442F239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*",
              "matchCriteriaId": "42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CD47CBD-A833-4CD0-A62C-22FBB7A4244D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C846C74-7644-4DAB-A4B8-B33464EBE92E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DDB0B25-95E0-4796-A56F-1A59EF7EA283",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F354F8F6-70D3-43EE-BF08-DFB87E83E847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F908B0-7ECE-40F8-8549-29BD1A070606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*",
              "matchCriteriaId": "378E67DD-779C-4852-BF29-38C2DFFB1BBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9033ACC7-1CCC-44E7-8275-73499C0E6E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10d:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFD4AF73-6C03-4978-BC43-857188BF7E4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C104A47-53EE-47FC-BAE5-21925BEE98E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DEE2C71-C401-43D1-86DC-725FE5FDF87E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB2842F6-4CD5-457C-AC75-241A5AB9534B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ABE0470-E94A-4CAF-865D-73E2607A0DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9CCD7E3-C62B-4151-96FF-1175D4896E95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "110B699D-169E-4932-A480-6EBB90CAE94B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C4E1F4-AD64-418C-A308-85501E0F3EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "57ED9CDC-FC03-4DA7-A791-CE61D0D8364D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB8C3BBA-4829-4006-B7EB-F552D86922C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D6D0AA7-E879-4303-AB2D-4FEF3574B60E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "345C9300-CAC2-4427-A6B4-8DBC72573E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "64BFCF66-DE06-46DA-8F9D-60A446DC0F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BDF6ABA-F0A4-423F-9056-A57C6A074137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "956FE25C-3CB8-4479-850D-719827123A3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e8:*:*:*:*:*:*:*",
              "matchCriteriaId": "23ABB581-90EF-4F6C-9778-735932D2B08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC3FD874-5EDF-48E0-A5AC-415A620C1FF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e10:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F396D6-9B6E-4E6A-B561-9822DB13C7AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "1374E243-4EC2-4A81-991C-B5705135CAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECA6101-94BA-4209-8243-A56AF02963EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF00927-80B0-4BE3-BF7C-E663A5E7763A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9795E31D-A642-4100-A980-CD49C291AB7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "83C79479-27C6-4273-BC80-70395D609197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28ACC494-2B4B-4BCE-9275-B7B10CC69B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BB9098-7C1D-4776-8B1F-EF4A0461CCDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "602A88C0-30D1-4B63-A8F7-EF1D35350897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D3AE0C5-D071-44B4-B820-422296FDC259",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5B6046-6377-471B-9639-D7F635B08190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCF1E00-1C43-486E-A64E-14F5BEF82362",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00CEE576-6C55-4BD4-B9F2-33E40483437B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l_cool:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2683677D-9FD4-416B-8CFF-D81AF3174B3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5F1600-30A5-4B31-A518-7B84BFE16883",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "868B074C-2A14-4242-829A-202095A2CFF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99C76EA7-969F-4A5F-B045-995C9445B415",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7794B87E-C70E-4DA3-9FC8-0170A0898557",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "845DDB35-3BB6-41CB-8304-340F444B6FE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A63DC2E4-83AB-487E-80D5-036723D930F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F543085-A2E2-4D7E-96EC-E9C6B964AED2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BC9AD1E-3FE7-42D2-9A8D-F71694EF9BAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2000D5-E0C0-4488-8213-DC3079301050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "179F9893-1C6B-468E-84F3-1CAAAE0A7671",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABDF97F-B703-40A0-B510-D73859139E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6637D9D4-14CE-48D2-90D4-19EF761F4193",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37BE430A-2446-4F29-88D8-D452D1022B02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09DF34EC-7BC3-44DC-B7B1-94162245CBBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06EEDB4F-BD1E-4914-AF79-64D42643683D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54BFFB02-7C84-4569-8129-74B84A5E7310",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F12A3197-0CE2-44F4-B310-DE8D4A72B00D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\r\n\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\r\n\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el software Cisco IOS para los switches Cisco Catalyst de las series 2960X, 2960XR, 2960CX y 3560CX podr\u00eda permitir que un atacante local autenticado con nivel de privilegio 15, o uno no autenticado con acceso f\u00edsico al dispositivo, ejecute c\u00f3digo persistente durante el arranque y rompa la cadena de confianza. Esta vulnerabilidad se debe a la falta de verificaci\u00f3n de firmas para archivos espec\u00edficos que pueden cargarse durante el arranque del dispositivo. Un atacante podr\u00eda explotar esta vulnerabilidad colocando un archivo manipulado en una ubicaci\u00f3n espec\u00edfica del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario durante el arranque. Dado que esto permite al atacante eludir una importante funci\u00f3n de seguridad del dispositivo, Cisco ha elevado la calificaci\u00f3n de impacto en la seguridad (SIR) de este aviso de media a alta."
    }
  ],
  "id": "CVE-2025-20181",
  "lastModified": "2025-08-04T18:51:54.673",
  "metrics": {
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-07T18:15:37.973",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-347"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…