Home

Description

A vulnerability in Cisco Catalyst Center Virtual Appliance could allow an authenticated, remote attacker to elevate privileges to Administrator on an affected system. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to perform unauthorized modifications to the system, including creating new user accounts or elevating their own privileges on an affected system. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Observer.

PUBLISHED Reserved 2024-10-10 | Published 2025-11-13 | Updated 2025-11-14 | Assigner cisco




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Access Control

Product status

Default status
unknown

2.3.7.5-VA
affected

2.3.7.6-VA
affected

2.3.7.7-VA
affected

2.3.7.9-VA
affected

2.3.7.9.75403.10-VA
affected

References

sec.cloudapps.cisco.com/...y/cisco-sa-catc-priv-esc-VS8EeCuX (cisco-sa-catc-priv-esc-VS8EeCuX)

cve.org (CVE-2025-20341)

nvd.nist.gov (CVE-2025-20341)

Download JSON