{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-20207","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2024-10-10T19:15:13.230Z","datePublished":"2025-02-05T16:15:06.012Z","dateUpdated":"2025-02-05T16:57:53.809Z"},"containers":{"cna":{"title":"Cisco Secure Email Gateway, Cisco Secure Email and Web Appliance and Cisco Secure Web Appliance SNMP Polling Information Disclosure Vulnerability","metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"}}],"descriptions":[{"lang":"en","value":"A vulnerability in Simple Network Management Protocol (SNMP) polling for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, remote attacker to obtain confidential information about the underlying operating system.\r\n\r\nThis vulnerability exists because the appliances do not protect confidential information at rest in response to SNMP poll requests. An attacker could exploit this vulnerability by sending a crafted SNMP poll request to the affected appliance. A successful exploit could allow the attacker to discover confidential information that should be restricted. To exploit this vulnerability, an attacker must have the configured SNMP credentials."}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-snmp-inf-FqPvL8sX","name":"cisco-sa-esa-sma-wsa-snmp-inf-FqPvL8sX"}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"source":{"advisory":"cisco-sa-esa-sma-wsa-snmp-inf-FqPvL8sX","discovery":"INTERNAL","defects":["CSCwk60819"]},"problemTypes":[{"descriptions":[{"lang":"en","description":"Exposure of Sensitive Information to an Unauthorized Actor","type":"cwe","cweId":"CWE-200"}]}],"affected":[{"vendor":"Cisco","product":"Cisco Secure Email","versions":[{"version":"14.0.0-698","status":"affected"},{"version":"13.5.1-277","status":"affected"},{"version":"13.0.0-392","status":"affected"},{"version":"14.2.0-620","status":"affected"},{"version":"13.0.5-007","status":"affected"},{"version":"13.5.4-038","status":"affected"},{"version":"14.2.1-020","status":"affected"},{"version":"14.3.0-032","status":"affected"},{"version":"15.0.0-104","status":"affected"},{"version":"15.0.1-030","status":"affected"},{"version":"15.5.0-048","status":"affected"},{"version":"15.5.1-055","status":"affected"}],"defaultStatus":"unknown"},{"vendor":"Cisco","product":"Cisco Secure Email and Web Manager","versions":[{"version":"13.6.2-023","status":"affected"},{"version":"13.6.2-078","status":"affected"},{"version":"13.0.0-249","status":"affected"},{"version":"13.0.0-277","status":"affected"},{"version":"13.8.1-052","status":"affected"},{"version":"13.8.1-068","status":"affected"},{"version":"13.8.1-074","status":"affected"},{"version":"14.0.0-404","status":"affected"},{"version":"12.8.1-002","status":"affected"},{"version":"14.1.0-227","status":"affected"},{"version":"13.6.1-201","status":"affected"},{"version":"14.2.0-203","status":"affected"},{"version":"14.2.0-212","status":"affected"},{"version":"12.8.1-021","status":"affected"},{"version":"13.8.1-108","status":"affected"},{"version":"14.2.0-224","status":"affected"},{"version":"14.3.0-120","status":"affected"},{"version":"15.0.0-334","status":"affected"},{"version":"15.5.1-024","status":"affected"},{"version":"15.5.1-029","status":"affected"}],"defaultStatus":"unknown"},{"vendor":"Cisco","product":"Cisco Secure Web Appliance","versions":[{"version":"11.8.0-453","status":"affected"},{"version":"12.5.3-002","status":"affected"},{"version":"12.0.3-007","status":"affected"},{"version":"12.0.3-005","status":"affected"},{"version":"14.1.0-032","status":"affected"},{"version":"14.1.0-047","status":"affected"},{"version":"14.1.0-041","status":"affected"},{"version":"12.0.4-002","status":"affected"},{"version":"14.0.2-012","status":"affected"},{"version":"11.8.0-414","status":"affected"},{"version":"12.0.1-268","status":"affected"},{"version":"11.8.1-023","status":"affected"},{"version":"11.8.3-021","status":"affected"},{"version":"11.8.3-018","status":"affected"},{"version":"12.5.1-011","status":"affected"},{"version":"11.8.4-004","status":"affected"},{"version":"12.5.2-007","status":"affected"},{"version":"12.5.2-011","status":"affected"},{"version":"14.5.0-498","status":"affected"},{"version":"12.5.4-005","status":"affected"},{"version":"12.5.4-011","status":"affected"},{"version":"12.0.5-011","status":"affected"},{"version":"14.0.3-014","status":"affected"},{"version":"12.5.5-004","status":"affected"},{"version":"12.5.5-005","status":"affected"},{"version":"12.5.5-008","status":"affected"},{"version":"14.0.4-005","status":"affected"},{"version":"14.5.1-008","status":"affected"},{"version":"14.5.1-016","status":"affected"},{"version":"15.0.0-355","status":"affected"},{"version":"15.0.0-322","status":"affected"},{"version":"12.5.6-008","status":"affected"},{"version":"15.1.0-287","status":"affected"},{"version":"14.5.2-011","status":"affected"},{"version":"15.2.0-116","status":"affected"},{"version":"14.0.5-007","status":"affected"},{"version":"15.2.0-164","status":"affected"},{"version":"14.5.1-510","status":"affected"},{"version":"12.0.2-012","status":"affected"},{"version":"12.0.2-004","status":"affected"},{"version":"14.5.1-607","status":"affected"},{"version":"14.5.3-033","status":"affected"},{"version":"12.0.1-334","status":"affected"},{"version":"14.0.1-503","status":"affected"},{"version":"14.0.1-053","status":"affected"},{"version":"11.8.0-429","status":"affected"},{"version":"14.0.1-040","status":"affected"},{"version":"14.0.1-014","status":"affected"},{"version":"12.5.1-043","status":"affected"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2025-02-05T16:15:06.012Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-05T16:57:37.294661Z","id":"CVE-2025-20207","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-05T16:57:53.809Z"}}]}}