A vulnerability in the self-service portal of Cisco Duo could allow an unauthenticated, remote attacker to inject arbitrary commands into emails that are sent by the service.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands into a portion of an email that is sent by the service. A successful exploit could allow the attacker to send emails that contain malicious content to unsuspecting users.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-ssp-cmd-inj-RCmYrNA | Vendor Advisory |
Configurations
History
23 Jul 2025, 16:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:duo:-:*:*:*:*:-:*:* | |
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-ssp-cmd-inj-RCmYrNA - Vendor Advisory | |
First Time |
Cisco
Cisco duo |
21 May 2025, 20:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-21 17:15
Updated : 2025-07-23 16:17
NVD link : CVE-2025-20258
Mitre link : CVE-2025-20258
CVE.ORG link : CVE-2025-20258
JSON object : View
Products Affected
cisco
- duo
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')