{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-20161","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2025-10-08T11:59:15.388Z","datePublished":"2026-04-15T16:03:43.769Z","dateUpdated":"2026-04-15T16:56:35.191Z"},"containers":{"cna":{"title":"Cisco ThousandEyes Enterprise Agent Arbitrary File Overwrite Vulnerability","metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"}}],"descriptions":[{"lang":"en","value":"A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent could allow an authenticated, local attacker with low privileges to overwrite arbitrary files on the local system of an affected device.\r\n\r\nThis vulnerability is due to improper access controls on files that are on the local file system&nbsp;of an affected device. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system. A successful exploit could allow the attacker to bypass file system permissions and overwrite arbitrary files on the affected device."}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-agentfilewrite-tqUw3SMU","name":"cisco-sa-te-agentfilewrite-tqUw3SMU"}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"source":{"advisory":"cisco-sa-te-agentfilewrite-tqUw3SMU","discovery":"INTERNAL","defects":["CSCwt14485"]},"problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Link Resolution Before File Access ('Link Following')","type":"cwe","cweId":"CWE-59"}]}],"affected":[{"vendor":"Cisco","product":"Cisco ThousandEyes Enterprise Agent","versions":[{"version":"Agent 5.0","status":"affected"},{"version":"Agent 4.4.4","status":"affected"},{"version":"Agent 4.4.3","status":"affected"},{"version":"Agent 4.4.2","status":"affected"},{"version":"Agent 4.2","status":"affected"},{"version":"Agent 4.1","status":"affected"},{"version":"Agent 4.0","status":"affected"},{"version":"Agent 5.1","status":"affected"},{"version":"Agent 5.1.2","status":"affected"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2026-04-15T16:03:43.769Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-20161","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2026-04-15T16:54:35.119090Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-15T16:56:35.191Z"}}]}}