First published: Wed May 07 2025(Updated: )
A vulnerability in the management API of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to read and modify the outgoing proxy configuration settings. This vulnerability is due to the lack of authentication in an API endpoint. An attacker could exploit this vulnerability by sending a request to the affected API of a Catalyst Center device. A successful exploit could allow the attacker to view or modify the outgoing proxy configuration, which could disrupt internet traffic from Cisco Catalyst Center or may allow the attacker to intercept outbound internet traffic.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst Center |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20210 is classified as a critical vulnerability due to its potential impact on sensitive configuration settings.
CVE-2025-20210 affects users of Cisco Catalyst Center who utilize the management API.
To mitigate CVE-2025-20210, ensure proper authentication measures are implemented for the API endpoint.
CVE-2025-20210 can allow unauthenticated remote attackers to read and modify outgoing proxy configuration settings.
At this time, Cisco has not released a patch specifically addressing CVE-2025-20210.