Description

A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials. This vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system. Note: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker.

INFO

Published Date :

2025-02-05T16:14:38.541Z

Last Modified :

2025-02-05T16:59:47.445Z

Source :

cisco
AFFECTED PRODUCTS

The following products are affected by CVE-2025-20185 vulnerability.

Vendors Products
Cisco
  • Asyncos
  • Secure Email And Web Manager M170
  • Secure Email And Web Manager M190
  • Secure Email And Web Manager M195
  • Secure Email And Web Manager M380
  • Secure Email And Web Manager M390
  • Secure Email And Web Manager M390x
  • Secure Email And Web Manager M395
  • Secure Email And Web Manager M680
  • Secure Email And Web Manager M690
  • Secure Email And Web Manager M690x
  • Secure Email And Web Manager M695
  • Secure Email And Web Manager Virtual Appliance M100v
  • Secure Email And Web Manager Virtual Appliance M300v
  • Secure Email And Web Manager Virtual Appliance M600v
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-20185.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact