Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20112: Privilege Chaining in Cisco Cisco Emergency Responder

0
Medium
VulnerabilityCVE-2025-20112cvecve-2025-20112
Published: Wed May 21 2025 (05/21/2025, 16:19:24 UTC)
Source: CVE
Vendor/Project: Cisco
Product: Cisco Emergency Responder

Description

A vulnerability in multiple Cisco Unified Communications and Contact Center Solutions products could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability is due to excessive permissions that have been assigned to system commands. An attacker could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to escape the restricted shell and gain root privileges on the underlying operating system of an affected device. To successfully exploit this vulnerability, an attacker would need administrative access to the ESXi hypervisor.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:37:35 UTC

Technical Analysis

CVE-2025-20112 is a privilege chaining vulnerability found in multiple versions of Cisco Emergency Responder, part of Cisco Unified Communications and Contact Center Solutions. The root cause is excessive permissions assigned to certain system commands, which allows an attacker who already has authenticated local access and administrative privileges on the ESXi hypervisor to execute crafted commands on the underlying operating system. This execution enables the attacker to escape the restricted shell environment and elevate privileges to root on the affected device. The vulnerability spans numerous versions from 12.5(1) through 15SU1a and related subversions. The CVSS 3.1 base score is 5.1, reflecting a medium severity with attack vector local, low attack complexity, high privileges required, no user interaction, unchanged scope, limited confidentiality impact, high integrity impact, and no availability impact. The vulnerability does not require user interaction but does require prior administrative access to the ESXi hypervisor, limiting the ease of exploitation. No public exploits or active exploitation have been reported to date. The vulnerability highlights the risk of improper permission assignments on system commands within Cisco’s communications infrastructure products, which can be leveraged for privilege escalation by insiders or attackers who have already compromised administrative hypervisor credentials.

Potential Impact

The primary impact of CVE-2025-20112 is the potential for an attacker with administrative ESXi hypervisor access to escalate privileges to root on Cisco Emergency Responder devices. This can lead to full control over the affected system, allowing the attacker to manipulate system configurations, intercept or alter communications, and potentially move laterally within the network. The compromise of root privileges undermines system integrity and confidentiality, posing significant risks to organizations relying on Cisco Unified Communications for critical voice and contact center operations. While availability is not directly impacted, the elevated privileges could facilitate further attacks that disrupt services. The requirement for administrative hypervisor access reduces the likelihood of external exploitation but increases the threat posed by insider attackers or attackers who have already breached virtualization infrastructure. Organizations with large deployments of Cisco Emergency Responder in sensitive environments such as government, finance, healthcare, and critical infrastructure could face serious operational and data security consequences if exploited.

Mitigation Recommendations

1. Restrict administrative access to the ESXi hypervisor strictly to trusted personnel and implement strong multi-factor authentication to reduce the risk of initial compromise. 2. Apply the latest Cisco patches and updates as soon as they become available for all affected versions of Cisco Emergency Responder to remediate the excessive permissions issue. 3. Conduct regular audits of system command permissions and user privileges on Cisco devices to detect and correct any excessive or inappropriate permissions. 4. Implement network segmentation and strict access controls to isolate Cisco Unified Communications infrastructure from general IT and user networks, limiting the attack surface. 5. Monitor hypervisor and device logs for unusual command executions or privilege escalation attempts to detect potential exploitation early. 6. Employ endpoint detection and response (EDR) solutions on management workstations and hypervisor hosts to identify suspicious activities. 7. Educate administrators on the risks of privilege escalation vulnerabilities and enforce the principle of least privilege for all administrative accounts. 8. Develop and test incident response plans specifically addressing potential compromise of communications infrastructure and hypervisor environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.210Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682e0169c4522896dcc0f066

Added to database: 5/21/2025, 4:38:01 PM

Last enriched: 2/26/2026, 8:37:35 PM

Last updated: 3/22/2026, 5:25:46 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses