Vulnerability Description
A vulnerability in the system file permission handling of Cisco APIC could allow an authenticated, local attacker to overwrite critical system files, which could cause a DoS condition. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to a race condition with handling system files. An attacker could exploit this vulnerability by doing specific operations on the file system. A successful exploit could allow the attacker to overwrite system files, which could lead to the device being in an inconsistent state and cause a DoS condition.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Application Policy Infrastructure Controller | 3.2\(1l\) |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-20119?
CVE-2025-20119 is a vulnerability with a CVSS score of 6.0 (MEDIUM). A vulnerability in the system file permission handling of Cisco APIC could allow an authenticated, local attacker to overwrite critical system files, which could cause a DoS condition. To exploit this...
How severe is CVE-2025-20119?
CVE-2025-20119 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-20119?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Application Policy Infrastructure Controller.