Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

CVE-2025-20160

A vulnerability in the implementation of the TACACS+ protocol in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to view sensitive data or bypass authentication. This vulnerability exists because the system does not properly check whether the required TACACS+ shared secret is configured. A machine-in-the-middle attacker could exploit this vulnerability by intercepting and reading unencrypted TACACS+ messages or impersonating the TACACS+ server and falsely accepting arbitrary authentication requests. A successful exploit could allow the attacker to view sensitive information in a TACACS+ message or bypass authentication and gain access to the affected device.

SeverityHIGH
CVSS8.1
CWECWE-287
KEV
Published
Modified

Related Products

Product Advisory Evidence
Cisco IOS cisco-sa-ios-tacacs-hdB7thJw Cisco OpenVuln
Cisco IOS XE Software cisco-sa-ios-tacacs-hdB7thJw Cisco OpenVuln
Cisco Catalyst 9600 Series Switches cisco-sa-ios-tacacs-hdB7thJw Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches cisco-sa-ios-tacacs-hdB7thJw Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches cisco-sa-ios-tacacs-hdB7thJw Cisco OpenVuln · software-dependent
Cisco Catalyst 9200 Series Switches cisco-sa-ios-tacacs-hdB7thJw Cisco OpenVuln · software-dependent
Cisco Catalyst 9300 Series Switches cisco-sa-ios-tacacs-hdB7thJw Cisco OpenVuln · software-dependent