CVE-2025-20160
BaseFortify
Publication date: 2025-09-24
Last updated on: 2025-09-26
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | ios_xe | * |
| cisco | ios | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Cisco IOS and IOS XE Software's TACACS+ protocol implementation allows an unauthenticated remote attacker to intercept or impersonate TACACS+ communications. It occurs because the system does not properly verify if the required TACACS+ shared secret is configured. An attacker could perform a man-in-the-middle attack to read unencrypted TACACS+ messages or impersonate the TACACS+ server, potentially viewing sensitive data or bypassing authentication.
How can this vulnerability impact me? :
Exploitation of this vulnerability could allow an attacker to view sensitive information transmitted in TACACS+ messages or bypass authentication controls, gaining unauthorized access to affected devices. This could lead to compromise of network devices and potentially broader network security breaches.