Secure Network Analytics Cisco Secure Network Analytics

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Cisco Secure Network Analytics.

Recent Cisco Secure Network Analytics Security Advisories

Advisory Title Published
2025-05-21 Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability May 21, 2025
2025-05-21 Cisco Secure Network Analytics Manager API Authorization Vulnerability May 21, 2025
2025-04-16 Cisco Secure Network Analytics Privilege Escalation Vulnerability April 16, 2025
2023-04-05 Cisco Secure Network Analytics Remote Code Execution Vulnerability April 5, 2023
2023-04-05 Cisco Secure Network Analytics Remote Code Execution Vulnerability April 5, 2023
2022-05-18 Cisco Secure Network Analytics Remote Code Execution Vulnerability May 18, 2022
2022-04-06 Cisco Secure Network Analytics Network Diagrams Application Cross-Site Scripting Vulnerability April 6, 2022
2022-01-12 Cisco Secure Network Analytics Cross-Site Scripting Vulnerability January 12, 2022

By the Year

In 2026 there have been 0 vulnerabilities in Cisco Secure Network Analytics. Last year, in 2025 Secure Network Analytics had 3 security vulnerabilities published. Right now, Secure Network Analytics is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 3 6.33
2024 1 6.10
2023 2 8.00
2022 2 7.25

It may take a day or so for new Secure Network Analytics vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Cisco Secure Network Analytics Security Vulnerabilities

Cisco Secure Network Analytics Manager API Auth Bypass for Fraudulent Alerts
CVE-2025-20257 6.5 - Medium - May 21, 2025

A vulnerability in an API subsystem of Cisco Secure Network Analytics Manager and Cisco Secure Network Analytics Virtual Manager could allow an authenticated, remote attacker with low privileges to generate fraudulent findings that are used to generate alarms and alerts on an affected product. Thi vulnerability is due to insufficient authorization enforcement on a specific API. An attacker could exploit this vulnerability by authenticating as a low-privileged user and performing API calls with crafted input. A successful exploit could allow the attacker to obfuscate legitimate findings in analytics reports or create false indications with alarms and alerts on an affected device.

AuthZ

Cisco SNAM: Authenticated RCE via Web Manager Input Validation
CVE-2025-20256 6.5 - Medium - May 21, 2025

A vulnerability in the web-based management interface of Cisco Secure Network Analytics Manager and Cisco Secure Network Analytics Virtual Manager could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system. This vulnerability is due to insufficient input validation in specific fields of the web-based management interface. An attacker with valid administrative credentials could exploit this vulnerability by sending crafted input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. 

Injection

Cisco Secure Network Analytics: Authenticated RCE via Malicious Backup File
CVE-2025-20178 6 - Medium - April 16, 2025

A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system. This vulnerability is due to insufficient integrity checks within device backup files. An attacker with valid administrative credentials could exploit this vulnerability by crafting a malicious backup file and restoring it to an affected device. A successful exploit could allow the attacker to obtain shell access on the underlying operating system with the privileges of root.

Improper Verification of Cryptographic Signature

Remote XSS in Cisco Secure Network Analytics Web UI
CVE-2022-20663 6.1 - Medium - November 15, 2024

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Stealthwatch Enterprise, could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see .

XSS

Cisco Secure Network Analytics: Authenticated Web File Upload RCE
CVE-2023-20103 7.2 - High - April 05, 2023

A vulnerability in Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code as a root user on an affected device. This vulnerability is due to insufficient validation of user input to the web interface. An attacker could exploit this vulnerability by uploading a crafted file to an affected device. A successful exploit could allow the attacker to execute code on the affected device. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.

Improper Input Validation

CVE-2023-20102: RCE via Authenticated Web UI in Cisco Secure Network Analytics
CVE-2023-20102 8.8 - High - April 05, 2023

A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system. This vulnerability is due to insufficient sanitization of user-provided data that is parsed into system memory. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the administrator user.

Marshaling, Unmarshaling

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Cisco Stealthwatch Enterprise, could
CVE-2022-20797 9.1 - Critical - May 27, 2022

A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Cisco Stealthwatch Enterprise, could allow an authenticated, remote attacker to execute arbitrary commands as an administrator on the underlying operating system. This vulnerability is due to insufficient user input validation by the web-based management interface of the affected software. An attacker could exploit this vulnerability by injecting arbitrary commands in the web-based management interface. A successful exploit could allow the attacker to make configuration changes on the affected device or cause certain services to restart unexpectedly.

Shell injection

A vulnerability in the web-based management interface of the Network Diagrams application for Cisco Secure Network Analytics, formerly Stealthwatch Enterprise, could
CVE-2022-20741 5.4 - Medium - April 06, 2022

A vulnerability in the web-based management interface of the Network Diagrams application for Cisco Secure Network Analytics, formerly Stealthwatch Enterprise, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

XSS

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Cisco Secure Network Analytics or by Cisco? Click the Watch button to subscribe.

Cisco
Vendor

subscribe