CVE-2025-20377

4.3 MEDIUM

📋 TL;DR

An authenticated information disclosure vulnerability in Cisco Unified Intelligence Center allows low-privileged users to access sensitive system information via improper API request validation. This affects organizations running vulnerable versions of Cisco Unified Intelligence Center with authenticated user access. Attackers need valid credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Cisco Unified Intelligence Center
Versions: Specific versions not detailed in provided reference; check Cisco advisory for exact affected versions
Operating Systems: Cisco appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access; default configurations with user accounts are vulnerable

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive configuration data, user information, or system details could be exposed to authenticated attackers, potentially enabling further attacks or data breaches.

🟠

Likely Case

Low-privileged authenticated users could access information beyond their authorization level, violating confidentiality but not enabling system takeover.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users accessing some additional information.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials and knowledge of specific API endpoints

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Cisco advisory for specific fixed versions

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-mult-vuln-gK4TFXSn

Restart Required: Yes

Instructions:

1. Review Cisco advisory for affected versions 2. Download and apply appropriate patch from Cisco 3. Restart affected services 4. Verify patch application

🔧 Temporary Workarounds

Restrict API Access

all

Limit network access to Cisco Unified Intelligence Center API endpoints

Configure firewall rules to restrict access to API ports from trusted networks only

Review User Permissions

all

Audit and minimize user privileges to reduce attack surface

Review and tighten user role assignments in Cisco Unified Intelligence Center administration

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Cisco Unified Intelligence Center from untrusted networks
  • Enforce principle of least privilege for all user accounts and regularly audit access logs

🔍 How to Verify

Check if Vulnerable:

Check Cisco Unified Intelligence Center version against affected versions listed in Cisco advisory

Check Version:

Check version via Cisco Unified Intelligence Center web interface or administrative console

Verify Fix Applied:

Verify installed version matches or exceeds fixed version from Cisco advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual API access patterns from low-privileged users
  • Multiple requests to sensitive API endpoints

Network Indicators:

  • Increased traffic to specific API endpoints from internal users

SIEM Query:

source="cuc_logs" AND (endpoint="sensitive_api" OR user_privilege="low") AND result="success"

🔗 References

📤 Share & Export