{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T03:21:40.883","vulnerabilities":[{"cve":{"id":"CVE-2025-20138","sourceIdentifier":"psirt@cisco.com","published":"2025-03-12T16:15:21.260","lastModified":"2025-07-31T18:11:01.253","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker with a low-privileged account could exploit this vulnerability by using crafted commands at the prompt. A successful exploit could allow the attacker to elevate privileges to root and execute arbitrary commands."},{"lang":"es","value":"Una vulnerabilidad en la CLI del software Cisco IOS XR podría permitir que un atacante local autenticado ejecute comandos arbitrarios como superusuario en el sistema operativo subyacente de un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de los argumentos de usuario que se pasan a comandos CLI específicos. Un atacante con una cuenta con pocos privilegios podría explotar esta vulnerabilidad utilizando comandos manipulados en el símbolo del sistema. Una explotación exitosa podría permitirle elevar los privilegios a superusuario y ejecutar comandos arbitrarios."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.0,"impactScore":6.0}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:x64:*","versionEndExcluding":"24.2.21","matchCriteriaId":"E9233952-426F-487C-83B4-AFC65496B50B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:x64:*","versionStartIncluding":"24.3","versionEndExcluding":"24.4","matchCriteriaId":"034114AC-4134-4A85-B6CF-C89FD17EEBF2"}]}]}],"references":[{"url":"https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/","source":"psirt@cisco.com","tags":["Technical Description"]},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-priv-esc-GFQjxvOF","source":"psirt@cisco.com","tags":["Vendor Advisory"]}]}}]}