Thousandeyes Enterprise Agent Cisco Thousandeyes Enterprise Agent

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Cisco Thousandeyes Enterprise Agent.

Recent Cisco Thousandeyes Enterprise Agent Security Advisories

Advisory Title Published
2026-04-15 Cisco ThousandEyes Enterprise Agent Arbitrary File Overwrite Vulnerability April 15, 2026
2024-01-10 Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability January 10, 2024
2023-08-17 Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability August 17, 2023
2023-08-17 Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability August 17, 2023

By the Year

In 2026 there have been 1 vulnerability in Cisco Thousandeyes Enterprise Agent with an average score of 5.5 out of ten. Thousandeyes Enterprise Agent did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2026 as compared to last year.

Year Vulnerabilities Average Score
2026 1 5.50
2025 0 0.00
2024 1 8.00
2023 2 6.65

It may take a day or so for new Thousandeyes Enterprise Agent vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Cisco Thousandeyes Enterprise Agent Security Vulnerabilities

Local File Overwrite via CLI in Cisco ThousandEyes EA
CVE-2026-20161 5.5 - Medium - April 15, 2026

A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent could allow an authenticated, local attacker with low privileges to overwrite arbitrary files on the local system of an affected device. This vulnerability is due to improper access controls on files that are on the local file system of an affected device. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system. A successful exploit could allow the attacker to bypass file system permissions and overwrite arbitrary files on the affected device.

insecure temporary file

Command Injection in Cisco ThousandEyes Agent Web UI (Root Escalation)
CVE-2024-20277 8 - High - January 17, 2024

A vulnerability in the web-based management interface of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands and elevate privileges to root.

CVE-2023-20224: Privilege Escalation via CLI in Cisco ThousandEyes Enterprise Agent
CVE-2023-20224 7.8 - High - August 16, 2023

A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability is due to insufficient input validation of user-supplied CLI arguments. An attacker could exploit this vulnerability by authenticating to an affected device and using crafted commands at the prompt. A successful exploit could allow the attacker to execute arbitrary commands as root. The attacker must have valid credentials on the affected device.

Argument Injection

Priv Escalation in Cisco ThousandEyes EE Agent CLI via sudo Input Validation
CVE-2023-20217 5.5 - Medium - August 16, 2023

A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing certain commands using sudo. A successful exploit could allow the attacker to view arbitrary files as root on the underlying operating system. The attacker must have valid credentials on the affected device.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Cisco Thousandeyes Enterprise Agent or by Cisco? Click the Watch button to subscribe.

Cisco
Vendor

subscribe