A vulnerability in Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to read and modify data in a repository that belongs to an internal service of an affected device.
This vulnerability is due to insufficient enforcement of access control on HTTP requests. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-insec-acc-mtt8EhEb | Vendor Advisory |
Configurations
History
23 Jul 2025, 14:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:catalyst_center:*:*:*:*:*:*:*:* | |
First Time |
Cisco catalyst Center
Cisco |
|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-insec-acc-mtt8EhEbĀ - Vendor Advisory |
08 May 2025, 14:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-07 18:15
Updated : 2025-07-23 14:53
NVD link : CVE-2025-20223
Mitre link : CVE-2025-20223
CVE.ORG link : CVE-2025-20223
JSON object : View
Products Affected
cisco
- catalyst_center
CWE
CWE-284
Improper Access Control