[CIVN-2025-0228] HTTP API Command Injection Vulnerability in CISCO
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
HTTP API Command Injection Vulnerability in CISCO
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Cisco IOS XE Software
Overview
A vulnerability has been reported in the HTTP API subsystem of Cisco IOS XE Software could allow a remote attacker to inject commands that will execute with root privileges into the underlying operating system.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating in HTTP API subsystem of Cisco IOS XE Software.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
This vulnerability exists due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by authenticating to an affected system and performing an API call with crafted input. Alternatively, an unauthenticated attacker could persuade a legitimate user with administrative privileges who is currently logged in to the system to click a crafted link.
Successful exploitation of this vulnerability could allow the attacker to execute arbitrary commands as the root user.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cmd-inject-rPJM8BGL
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cmd-inject-rPJM8BGL
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cmd-inject-rPJM8BGL
CVE Name
CVE-2025-20334
– – —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=qOOx
—–END PGP SIGNATURE—–