CVE-2025-20259

Multiple vulnerabilities in the update process of Cisco ThousandEyes Endpoint Agent for Windows could allow an authenticated, local attacker to delete arbitrary files on an affected device. These vulnerabilities are due to improper access controls on files that are in the local file system. An attacker could exploit these vulnerabilities by using a symbolic link to perform an agent upgrade that redirects the delete operation of any protected file. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:cisco:thousandeyes_endpoint_agent:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

22 Jul 2025, 15:31

Type Values Removed Values Added
First Time Microsoft windows
Cisco
Cisco thousandeyes Endpoint Agent
Microsoft
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-endagent-filewrt-zNcDqNRJ - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-endagent-filewrt-zNcDqNRJ - Vendor Advisory
CPE cpe:2.3:a:cisco:thousandeyes_endpoint_agent:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

05 Jun 2025, 20:12

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-04 17:15

Updated : 2025-07-22 15:31


NVD link : CVE-2025-20259

Mitre link : CVE-2025-20259

CVE.ORG link : CVE-2025-20259


JSON object : View

Products Affected

microsoft

  • windows

cisco

  • thousandeyes_endpoint_agent
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')