Vulnslist

find the latest Cisco vulnerabilities

Cisco Catalyst Center Unauthenticated API Access Vulnerability

cisco-sa-dnac-api-nBPZcJCM · High · Published · Updated

A vulnerability in the management API of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to read and modify the outgoing proxy configuration settings. This vulnerability is due to the lack of authentication in an API endpoint. An attacker could exploit this vulnerability by sending a request to the affected API of a Catalyst Center device. A successful exploit could allow the attacker to view or modify the outgoing proxy configuration, which could disrupt internet traffic from Cisco Catalyst Center or may allow the attacker to intercept outbound internet traffic. Note: For information about Cisco Catalyst Center features that require an internet connection and the corresponding internet domains used, see the Required internet URLs and fully qualified domain names section of the Cisco Catalyst Center Third-Generation Appliance Installation Guide. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-api-nBPZcJCM

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2025-20210
Cisco Bug IDsCSCwn10252
CVSS ScoreBase 7.3
Base 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X
Product Names From Source
Cisco Digital Network Architecture Center (DNA Center)

Related Products

Product CVE Evidence
Cisco Nexus Dashboard CVE-2025-20210 Cisco OpenVuln
Cisco Catalyst PON Series Switches CVE-2025-20210 Cisco OpenVuln
Cisco Digital Network Architecture Center (DNA Center) CVE-2025-20210 Cisco OpenVuln