A vulnerability in the management API of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to read and modify the outgoing proxy configuration settings.
This vulnerability is due to the lack of authentication in an API endpoint. An attacker could exploit this vulnerability by sending a request to the affected API of a Catalyst Center device. A successful exploit could allow the attacker to view or modify the outgoing proxy configuration, which could disrupt internet traffic from Cisco Catalyst Center or may allow the attacker to intercept outbound internet traffic.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-api-nBPZcJCM | Vendor Advisory |
Configurations
History
13 Aug 2025, 19:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-api-nBPZcJCM - Vendor Advisory | |
First Time |
Cisco catalyst Center
Cisco |
|
CPE | cpe:2.3:a:cisco:catalyst_center:*:*:*:*:*:*:*:* |
08 May 2025, 14:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-07 18:15
Updated : 2025-08-13 19:05
NVD link : CVE-2025-20210
Mitre link : CVE-2025-20210
CVE.ORG link : CVE-2025-20210
JSON object : View
Products Affected
cisco
- catalyst_center
CWE
CWE-306
Missing Authentication for Critical Function