CVE-2025-20308
BaseFortify
Publication date: 2025-07-02
Last updated on: 2025-07-23
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | spaces_connector | 3.0 |
| cisco | spaces_connector | 3.0 |
| cisco | spaces_connector | 3.0 |
| cisco | spaces_connector | 3.0 |
| cisco | spaces_connector | 3.0 |
| cisco | spaces_connector | 3.0 |
| cisco | spaces_connector | 3.0 |
| cisco | spaces_connector | 3.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Cisco Spaces Connector allows an authenticated local attacker logged in as the spacesadmin user to execute specific CLI commands with crafted parameters that escalate their privileges to root on the underlying operating system. It is caused by insufficient restrictions during the execution of certain CLI commands, enabling arbitrary command execution with root privileges. [1]
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can elevate their privileges from the spacesadmin user to root, allowing them to execute arbitrary commands on the underlying operating system with full control. This could lead to unauthorized system modifications, data compromise, or disruption of services on affected Cisco Spaces Connector devices. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves verifying if Cisco Spaces Connector devices are running vulnerable versions prior to the fixed release Connector 3-Jun 2025. Since the vulnerability requires authenticated local access as the spacesadmin user and involves execution of crafted CLI commands, monitoring for unusual CLI command usage by the spacesadmin user may help. However, no specific detection commands or signatures are provided. It is recommended to check the software version on the device to confirm if it is vulnerable. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade Cisco Spaces Connector to the fixed software version Connector 3-Jun 2025 or later. There are no available workarounds. Additionally, restrict access to the spacesadmin user account to trusted personnel only and monitor CLI usage closely until the upgrade is applied. [1]