Cisco IOS/XE Vulnerability Allows Unauthorized Access to Confidential Data

Cisco IOS/XE Vulnerability Allows Unauthorized Access to Confidential Data

 Cisco released an advisory describing a high-severity vulnerability (CVE-2025-20160) in its IOS and IOS XE platforms. The flaw stems from improper validation of the TACACS+ shared secret configuration.

When TACACS+ is enabled but no secret is set, remote attackers or machine-in-the-middle adversaries can intercept or manipulate authentication messages.

Successful exploitation grants unauthorized access to confidential information or full device control.

Overview of the Vulnerability

The vulnerability exists because the software fails to verify that a TACACS+ shared secret has been configured before processing authentication requests.

An attacker on the network path can either read unencrypted TACACS+ messages or impersonate the TACACS+ server.

CVE Affected Products CVSS 3.1 Score
CVE-2025-20160 Cisco IOS and IOS XE Software with TACACS+ configured without a shared secret 8.1 (High)

By sending crafted responses, the attacker can bypass authentication checks altogether. This allows full administrative access to routers and switches running vulnerable IOS or IOS XE releases, exposing configuration data, credentials, and other sensitive information.

Any Cisco device running a vulnerable IOS or IOS XE release and configured for TACACS+ without a shared secret is at risk.

Impact ranges from unauthorized disclosure of TACACS+ payloads to complete authentication bypass, granting full administrative privileges.

Cisco has not observed any public exploits or malicious activity targeting this issue to date.

Cisco strongly urges all customers to apply the provided software updates immediately. Fixed releases are listed in the advisory’s “Fixed Software” section.

As a temporary measure, administrators must ensure every TACACS+ server configured on a device has a valid shared secret.

Use the show running-config | include tacacs server|key command to verify that no TACACS+ server entry is missing its key line.

After confirming proper key configuration, plan an upgrade to a fixed IOS or IOS XE version at the earliest opportunity.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.