CVE-2025-20223

4.7 MEDIUM

📋 TL;DR

This vulnerability in Cisco Catalyst Center (formerly DNA Center) allows authenticated remote attackers to bypass access controls and read/modify data in internal service repositories. Attackers can exploit it by sending crafted HTTP requests to affected devices. Organizations using vulnerable versions of Cisco Catalyst Center are affected.

💻 Affected Systems

Products:
  • Cisco Catalyst Center
  • Cisco DNA Center
Versions: All versions prior to 2.3.7.6
Operating Systems: Cisco proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the Catalyst Center platform itself, not dependent on specific OS configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains unauthorized access to sensitive configuration data, modifies system settings, potentially disrupting network operations or enabling further attacks.

🟠

Likely Case

Unauthorized data access and modification within internal service repositories, potentially exposing sensitive configuration information.

🟢

If Mitigated

Limited impact due to proper network segmentation, strong authentication controls, and monitoring of administrative access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but exploitation is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.7.6 and later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-insec-acc-mtt8EhEb

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install Catalyst Center version 2.3.7.6 or later from Cisco Software Center. 3. Follow Cisco's upgrade documentation for proper installation procedure. 4. Verify successful upgrade and functionality.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative access to Catalyst Center to only trusted IP addresses and users

Network Segmentation

all

Isolate Catalyst Center management interface from general network access

🧯 If You Can't Patch

  • Implement strict access controls and network segmentation to limit exposure
  • Enable detailed logging and monitoring for suspicious HTTP requests to Catalyst Center

🔍 How to Verify

Check if Vulnerable:

Check Catalyst Center version via web interface (System > About) or CLI command 'show version'

Check Version:

show version

Verify Fix Applied:

Verify version is 2.3.7.6 or later and test administrative functions

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to internal service endpoints
  • Multiple failed authentication attempts followed by successful access
  • Unexpected data access patterns in service logs

Network Indicators:

  • HTTP requests to unusual Catalyst Center endpoints
  • Traffic from unexpected sources to management interface

SIEM Query:

source="catalyst-center" AND (http_method="POST" OR http_method="PUT") AND uri CONTAINS "/api/" AND status=200 AND user_agent NOT IN ["normal-user-agents"]

🔗 References

📤 Share & Export