Multiple vulnerabilities in the update process of Cisco ThousandEyes Endpoint Agent for Windows could allow an authenticated, local attacker to delete arbitrary files on an affected device.
These vulnerabilities are due to improper access controls on files that are in the local file system. An attacker could exploit these vulnerabilities by using a symbolic link to perform an agent upgrade that redirects the delete operation of any protected file. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Jul 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco thousandeyes Endpoint Agent Microsoft Microsoft windows |
|
CPEs | cpe:2.3:a:cisco:thousandeyes_endpoint_agent:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Cisco
Cisco thousandeyes Endpoint Agent Microsoft Microsoft windows |
Wed, 04 Jun 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 04 Jun 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Multiple vulnerabilities in the update process of Cisco ThousandEyes Endpoint Agent for Windows could allow an authenticated, local attacker to delete arbitrary files on an affected device. These vulnerabilities are due to improper access controls on files that are in the local file system. An attacker could exploit these vulnerabilities by using a symbolic link to perform an agent upgrade that redirects the delete operation of any protected file. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device. | |
Title | Cisco ThousandEyes Endpoint Agent for Windows Arbitrary File Write Vulnerability | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2025-06-04T18:19:11.860Z
Reserved: 2024-10-10T19:15:13.242Z
Link: CVE-2025-20259

Updated: 2025-06-04T18:12:26.256Z

Status : Analyzed
Published: 2025-06-04T17:15:26.620
Modified: 2025-07-22T15:31:19.220
Link: CVE-2025-20259

No data.