{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T17:38:11.855","vulnerabilities":[{"cve":{"id":"CVE-2025-20256","sourceIdentifier":"psirt@cisco.com","published":"2025-05-21T17:15:57.057","lastModified":"2025-08-01T15:10:29.870","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of Cisco Secure Network Analytics Manager and Cisco Secure Network Analytics Virtual Manager could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system.\r\n\r\nThis vulnerability is due to insufficient input validation in specific fields of the web-based management interface. An attacker with valid administrative credentials could exploit this vulnerability by sending crafted input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.&nbsp;"},{"lang":"es","value":"Una vulnerabilidad en la interfaz de administración web de Cisco Secure Network Analytics Manager y Cisco Secure Network Analytics Virtual Manager podría permitir que un atacante remoto autenticado con credenciales administrativas válidas ejecute comandos arbitrarios como root en el sistema operativo subyacente. Esta vulnerabilidad se debe a una validación de entrada insuficiente en campos específicos de la interfaz de administración web. Un atacante con credenciales administrativas válidas podría explotar esta vulnerabilidad enviando una entrada manipulada a un dispositivo afectado. Una explotación exitosa podría permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente con privilegios de root."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-74"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_network_analytics:7.4.1:*:*:*:*:*:*:*","matchCriteriaId":"4F73293C-EBE9-4897-B4DB-C6E34F8847FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_network_analytics:7.4.2:*:*:*:*:*:*:*","matchCriteriaId":"504CD9B3-AEE8-42FB-93AD-2F44E7EED250"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_network_analytics:7.5.0:-:*:*:*:*:*:*","matchCriteriaId":"ABF18A19-D511-4562-9AAD-F9FBC34121CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_network_analytics:7.5.1:-:*:*:*:*:*:*","matchCriteriaId":"D4189BF6-CDE8-4942-9CEC-62CCF5DDB36F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:secure_network_analytics:7.5.2:-:*:*:*:*:*:*","matchCriteriaId":"056011B7-1805-4668-951A-44970D7FAF89"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-ssti-dPuLqSmZ","source":"psirt@cisco.com","tags":["Vendor Advisory"]}]}}]}