Cisco Catalyst Center Virtual Appliance HTTP Open Redirect Vulnerability

cisco-sa-catc-open-redirect-3W5Bk3Je · Medium · Published · Updated

A vulnerability in the web-based management interface of Cisco Catalyst Center Virtual Appliance could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a malicious web page. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-open-redirect-3W5Bk3Je

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2025-20355
Cisco Bug IDsCSCwo33422
CVSS ScoreBase 4.7
Base 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:X/RL:X/RC:X

Public Affected Products