Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cnvd-2025-06670
Vulnerability from cnvd
Title: Cisco Application Policy Infrastructure Controller跨站脚本漏洞
Description:
Cisco Application Policy Infrastructure Controller是美国思科(Cisco)公司的一款用于 Cisco ACI交换矩阵自动化和管理的软件。
Cisco Application Policy Infrastructure Controller存在跨站脚本漏洞,攻击者可利用该漏洞注入恶意脚本或HTML代码,当恶意数据被查看时,可获取敏感信息。
Severity: 中
Patch Name: Cisco Application Policy Infrastructure Controller跨站脚本漏洞的补丁
Patch Description:
Cisco Application Policy Infrastructure Controller是美国思科(Cisco)公司的一款用于 Cisco ACI交换矩阵自动化和管理的软件。
Cisco Application Policy Infrastructure Controller存在跨站脚本漏洞,攻击者可利用该漏洞注入恶意脚本或HTML代码,当恶意数据被查看时,可获取敏感信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级程序修复该安全问题,详情见厂商官网: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5
Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-20116
Name | Cisco Application Policy Infrastructure Controller (APIC) |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2025-20116", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-20116" } }, "description": "Cisco Application Policy Infrastructure Controller\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u7528\u4e8e Cisco ACI\u4ea4\u6362\u77e9\u9635\u81ea\u52a8\u5316\u548c\u7ba1\u7406\u7684\u8f6f\u4ef6\u3002\n\nCisco Application Policy Infrastructure Controller\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6ce8\u5165\u6076\u610f\u811a\u672c\u6216HTML\u4ee3\u7801\uff0c\u5f53\u6076\u610f\u6570\u636e\u88ab\u67e5\u770b\u65f6\uff0c\u53ef\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u7a0b\u5e8f\u4fee\u590d\u8be5\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u89c1\u5382\u5546\u5b98\u7f51:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2025-06670", "openTime": "2025-04-07", "patchDescription": "Cisco Application Policy Infrastructure Controller\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u7528\u4e8e Cisco ACI\u4ea4\u6362\u77e9\u9635\u81ea\u52a8\u5316\u548c\u7ba1\u7406\u7684\u8f6f\u4ef6\u3002\r\n\r\nCisco Application Policy Infrastructure Controller\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6ce8\u5165\u6076\u610f\u811a\u672c\u6216HTML\u4ee3\u7801\uff0c\u5f53\u6076\u610f\u6570\u636e\u88ab\u67e5\u770b\u65f6\uff0c\u53ef\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Cisco Application Policy Infrastructure Controller\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Cisco Application Policy Infrastructure Controller (APIC)" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2025-20116", "serverity": "\u4e2d", "submitTime": "2025-03-03", "title": "Cisco Application Policy Infrastructure Controller\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e" }
CVE-2025-20116 (GCVE-0-2025-20116)
Vulnerability from cvelistv5
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Application Policy Infrastructure Controller (APIC) |
Version: 3.2(8d) Version: 3.2(1m) Version: 3.2(5e) Version: 4.1(2m) Version: 3.2(41d) Version: 3.2(3s) Version: 4.0(3c) Version: 4.1(1k) Version: 3.2(4d) Version: 4.2(2e) Version: 4.2(3j) Version: 4.2(3n) Version: 4.0(1h) Version: 4.1(1l) Version: 3.2(9f) Version: 4.2(3l) Version: 4.2(2g) Version: 3.2(7k) Version: 3.2(9b) Version: 3.2(3j) Version: 4.1(2u) Version: 4.2(1l) Version: 4.1(1a) Version: 4.0(3d) Version: 3.2(4e) Version: 4.1(1i) Version: 3.2(5f) Version: 3.2(1l) Version: 4.2(1i) Version: 4.1(2o) Version: 4.2(1g) Version: 4.1(2g) Version: 4.2(2f) Version: 3.2(6i) Version: 3.2(3i) Version: 3.2(3n) Version: 4.1(2x) Version: 3.2(5d) Version: 4.2(3q) Version: 4.1(1j) Version: 4.1(2w) Version: 3.2(2o) Version: 3.2(3r) Version: 4.0(2c) Version: 4.1(2s) Version: 3.2(7f) Version: 3.2(3o) Version: 3.2(2l) Version: 4.2(1j) Version: 4.2(4i) Version: 3.2(9h) Version: 5.0(1k) Version: 4.2(4k) Version: 5.0(1l) Version: 5.0(2e) Version: 4.2(4o) Version: 4.2(4p) Version: 5.0(2h) Version: 4.2(5k) Version: 4.2(5l) Version: 4.2(5n) Version: 5.1(1h) Version: 4.2(6d) Version: 5.1(2e) Version: 4.2(6g) Version: 4.2(6h) Version: 5.1(3e) Version: 3.2(10e) Version: 4.2(6l) Version: 4.2(7f) Version: 5.1(4c) Version: 4.2(6o) Version: 5.2(1g) Version: 5.2(2e) Version: 4.2(7l) Version: 3.2(10f) Version: 5.2(2f) Version: 5.2(2g) Version: 4.2(7q) Version: 5.2(2h) Version: 5.2(3f) Version: 5.2(3e) Version: 5.2(3g) Version: 4.2(7r) Version: 4.2(7s) Version: 5.2(4d) Version: 5.2(4e) Version: 4.2(7t) Version: 5.2(5d) Version: 3.2(10g) Version: 5.2(5c) Version: 6.0(1g) Version: 4.2(7u) Version: 5.2(5e) Version: 5.2(4f) Version: 5.2(6e) Version: 6.0(1j) Version: 5.2(6g) Version: 5.2(7f) Version: 4.2(7v) Version: 5.2(7g) Version: 6.0(2h) Version: 4.2(7w) Version: 5.2(6h) Version: 5.2(4h) Version: 5.2(8d) Version: 6.0(2j) Version: 5.2(8e) Version: 6.0(3d) Version: 6.0(3e) Version: 5.2(8f) Version: 5.2(8g) Version: 5.3(1d) Version: 5.2(8h) Version: 6.0(4c) Version: 5.3(2a) Version: 5.2(8i) Version: 6.0(5h) Version: 5.3(2b) Version: 6.0(3g) Version: 6.0(5j) Version: 5.3(2c) Version: 6.0(6c) Version: 6.1(1f) Version: 6.0(7e) Version: 5.3(2d) Version: 6.0(8d) Version: 5.3(2e) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20116", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-26T16:49:28.397648Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T15:10:56.631Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.2(8d)" }, { "status": "affected", "version": "3.2(1m)" }, { "status": "affected", "version": "3.2(5e)" }, { "status": "affected", "version": "4.1(2m)" }, { "status": "affected", "version": "3.2(41d)" }, { "status": "affected", "version": "3.2(3s)" }, { "status": "affected", "version": "4.0(3c)" }, { "status": "affected", "version": "4.1(1k)" }, { "status": "affected", "version": "3.2(4d)" }, { "status": "affected", "version": "4.2(2e)" }, { "status": "affected", "version": "4.2(3j)" }, { "status": "affected", "version": "4.2(3n)" }, { "status": "affected", "version": "4.0(1h)" }, { "status": "affected", "version": "4.1(1l)" }, { "status": "affected", "version": "3.2(9f)" }, { "status": "affected", "version": "4.2(3l)" }, { "status": "affected", "version": "4.2(2g)" }, { "status": "affected", "version": "3.2(7k)" }, { "status": "affected", "version": "3.2(9b)" }, { "status": "affected", "version": "3.2(3j)" }, { "status": "affected", "version": "4.1(2u)" }, { "status": "affected", "version": "4.2(1l)" }, { "status": "affected", "version": "4.1(1a)" }, { "status": "affected", "version": "4.0(3d)" }, { "status": "affected", "version": "3.2(4e)" }, { "status": "affected", "version": "4.1(1i)" }, { "status": "affected", "version": "3.2(5f)" }, { "status": "affected", "version": "3.2(1l)" }, { "status": "affected", "version": "4.2(1i)" }, { "status": "affected", "version": "4.1(2o)" }, { "status": "affected", "version": "4.2(1g)" }, { "status": "affected", "version": "4.1(2g)" }, { "status": "affected", "version": "4.2(2f)" }, { "status": "affected", "version": "3.2(6i)" }, { "status": "affected", "version": "3.2(3i)" }, { "status": "affected", "version": "3.2(3n)" }, { "status": "affected", "version": "4.1(2x)" }, { "status": "affected", "version": "3.2(5d)" }, { "status": "affected", "version": "4.2(3q)" }, { "status": "affected", "version": "4.1(1j)" }, { "status": "affected", "version": "4.1(2w)" }, { "status": "affected", "version": "3.2(2o)" }, { "status": "affected", "version": "3.2(3r)" }, { "status": "affected", "version": "4.0(2c)" }, { "status": "affected", "version": "4.1(2s)" }, { "status": "affected", "version": "3.2(7f)" }, { "status": "affected", "version": "3.2(3o)" }, { "status": "affected", "version": "3.2(2l)" }, { "status": "affected", "version": "4.2(1j)" }, { "status": "affected", "version": "4.2(4i)" }, { "status": "affected", "version": "3.2(9h)" }, { "status": "affected", "version": "5.0(1k)" }, { "status": "affected", "version": "4.2(4k)" }, { "status": "affected", "version": "5.0(1l)" }, { "status": "affected", "version": "5.0(2e)" }, { "status": "affected", "version": "4.2(4o)" }, { "status": "affected", "version": "4.2(4p)" }, { "status": "affected", "version": "5.0(2h)" }, { "status": "affected", "version": "4.2(5k)" }, { "status": "affected", "version": "4.2(5l)" }, { "status": "affected", "version": "4.2(5n)" }, { "status": "affected", "version": "5.1(1h)" }, { "status": "affected", "version": "4.2(6d)" }, { "status": "affected", "version": "5.1(2e)" }, { "status": "affected", "version": "4.2(6g)" }, { "status": "affected", "version": "4.2(6h)" }, { "status": "affected", "version": "5.1(3e)" }, { "status": "affected", "version": "3.2(10e)" }, { "status": "affected", "version": "4.2(6l)" }, { "status": "affected", "version": "4.2(7f)" }, { "status": "affected", "version": "5.1(4c)" }, { "status": "affected", "version": "4.2(6o)" }, { "status": "affected", "version": "5.2(1g)" }, { "status": "affected", "version": "5.2(2e)" }, { "status": "affected", "version": "4.2(7l)" }, { "status": "affected", "version": "3.2(10f)" }, { "status": "affected", "version": "5.2(2f)" }, { "status": "affected", "version": "5.2(2g)" }, { "status": "affected", "version": "4.2(7q)" }, { "status": "affected", "version": "5.2(2h)" }, { "status": "affected", "version": "5.2(3f)" }, { "status": "affected", "version": "5.2(3e)" }, { "status": "affected", "version": "5.2(3g)" }, { "status": "affected", "version": "4.2(7r)" }, { "status": "affected", "version": "4.2(7s)" }, { "status": "affected", "version": "5.2(4d)" }, { "status": "affected", "version": "5.2(4e)" }, { "status": "affected", "version": "4.2(7t)" }, { "status": "affected", "version": "5.2(5d)" }, { "status": "affected", "version": "3.2(10g)" }, { "status": "affected", "version": "5.2(5c)" }, { "status": "affected", "version": "6.0(1g)" }, { "status": "affected", "version": "4.2(7u)" }, { "status": "affected", "version": "5.2(5e)" }, { "status": "affected", "version": "5.2(4f)" }, { "status": "affected", "version": "5.2(6e)" }, { "status": "affected", "version": "6.0(1j)" }, { "status": "affected", "version": "5.2(6g)" }, { "status": "affected", "version": "5.2(7f)" }, { "status": "affected", "version": "4.2(7v)" }, { "status": "affected", "version": "5.2(7g)" }, { "status": "affected", "version": "6.0(2h)" }, { "status": "affected", "version": "4.2(7w)" }, { "status": "affected", "version": "5.2(6h)" }, { "status": "affected", "version": "5.2(4h)" }, { "status": "affected", "version": "5.2(8d)" }, { "status": "affected", "version": "6.0(2j)" }, { "status": "affected", "version": "5.2(8e)" }, { "status": "affected", "version": "6.0(3d)" }, { "status": "affected", "version": "6.0(3e)" }, { "status": "affected", "version": "5.2(8f)" }, { "status": "affected", "version": "5.2(8g)" }, { "status": "affected", "version": "5.3(1d)" }, { "status": "affected", "version": "5.2(8h)" }, { "status": "affected", "version": "6.0(4c)" }, { "status": "affected", "version": "5.3(2a)" }, { "status": "affected", "version": "5.2(8i)" }, { "status": "affected", "version": "6.0(5h)" }, { "status": "affected", "version": "5.3(2b)" }, { "status": "affected", "version": "6.0(3g)" }, { "status": "affected", "version": "6.0(5j)" }, { "status": "affected", "version": "5.3(2c)" }, { "status": "affected", "version": "6.0(6c)" }, { "status": "affected", "version": "6.1(1f)" }, { "status": "affected", "version": "6.0(7e)" }, { "status": "affected", "version": "5.3(2d)" }, { "status": "affected", "version": "6.0(8d)" }, { "status": "affected", "version": "5.3(2e)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web UI of Cisco APIC could allow an authenticated, remote attacker to perform a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by injecting malicious code into specific pages of the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web UI or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-26T16:11:17.385Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-apic-multi-vulns-9ummtg5", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5" } ], "source": { "advisory": "cisco-sa-apic-multi-vulns-9ummtg5", "defects": [ "CSCwk18863" ], "discovery": "EXTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20116", "datePublished": "2025-02-26T16:11:17.385Z", "dateReserved": "2024-10-10T19:15:13.210Z", "dateUpdated": "2025-02-27T15:10:56.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.