First published: Wed May 07 2025(Updated: )
A vulnerability in Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to read and modify data in a repository that belongs to an internal service of an affected device. This vulnerability is due to insufficient enforcement of access control on HTTP requests. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst Center |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20223 is rated as a high severity vulnerability due to its potential to allow remote attackers to read and modify sensitive data.
To mitigate CVE-2025-20223, update your Cisco Catalyst Center to the latest version that addresses this vulnerability.
CVE-2025-20223 affects users of Cisco Catalyst Center, specifically those using versions with insufficient access control enforcement.
Attackers exploiting CVE-2025-20223 can perform unauthorized reading and modification of data within internal service repositories.
Yes, CVE-2025-20223 requires an authenticated remote attacker to take advantage of the vulnerability.