These vulnerabilities are due to improper access controls on files that are in the local file system. An attacker could exploit these vulnerabilities by using a symbolic link to perform an agent upgrade that redirects the delete operation of any protected file. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16882 | Multiple vulnerabilities in the update process of Cisco ThousandEyes Endpoint Agent for Windows could allow an authenticated, local attacker to delete arbitrary files on an affected device. These vulnerabilities are due to improper access controls on files that are in the local file system. An attacker could exploit these vulnerabilities by using a symbolic link to perform an agent upgrade that redirects the delete operation of any protected file. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 22 Jul 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco thousandeyes Endpoint Agent Microsoft Microsoft windows |
|
| CPEs | cpe:2.3:a:cisco:thousandeyes_endpoint_agent:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Cisco
Cisco thousandeyes Endpoint Agent Microsoft Microsoft windows |
Wed, 04 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Jun 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Multiple vulnerabilities in the update process of Cisco ThousandEyes Endpoint Agent for Windows could allow an authenticated, local attacker to delete arbitrary files on an affected device. These vulnerabilities are due to improper access controls on files that are in the local file system. An attacker could exploit these vulnerabilities by using a symbolic link to perform an agent upgrade that redirects the delete operation of any protected file. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device. | |
| Title | Cisco ThousandEyes Endpoint Agent for Windows Arbitrary File Write Vulnerability | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2025-06-04T18:19:11.860Z
Reserved: 2024-10-10T19:15:13.242Z
Link: CVE-2025-20259
Updated: 2025-06-04T18:12:26.256Z
Status : Analyzed
Published: 2025-06-04T17:15:26.620
Modified: 2025-07-22T15:31:19.220
Link: CVE-2025-20259
No data.
OpenCVE Enrichment
No data.
EUVD