CVE-2025-20259

Multiple vulnerabilities in the update process of Cisco ThousandEyes Endpoint Agent for Windows could allow an authenticated, local attacker to delete arbitrary files on an affected device. These vulnerabilities are due to improper access controls on files that are in the local file system. An attacker could exploit these vulnerabilities by using a symbolic link to perform an agent upgrade that redirects the delete operation of any protected file. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:cisco:thousandeyes_endpoint_agent:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

22 Jul 2025, 15:31

Type Values Removed Values Added
First Time Microsoft
Cisco thousandeyes Endpoint Agent
Cisco
Microsoft windows
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:thousandeyes_endpoint_agent:*:*:*:*:*:*:*:*
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-endagent-filewrt-zNcDqNRJ - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-endagent-filewrt-zNcDqNRJ - Vendor Advisory

04 Jun 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-04 17:15

Updated : 2025-07-22 15:31


NVD link : CVE-2025-20259

Mitre link : CVE-2025-20259


JSON object : View

Products Affected

cisco

  • thousandeyes_endpoint_agent

microsoft

  • windows
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')