Cisco Catalyst Center Access Control Flaw Allows Data Manipulation
CVE-2025-20223 Published on May 7, 2025

A vulnerability in Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to read and modify data in a repository that belongs to an internal service of an affected device. This vulnerability is due to insufficient enforcement of access control on HTTP requests. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device.

NVD

Vulnerability Analysis

CVE-2025-20223 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
LOW

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2025-20223 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2025-20223

Want to know whenever a new CVE is published for Cisco Catalyst Center? stack.watch will email you.

 

Affected Versions

Cisco Digital Network Architecture Center (DNA Center) Version N/A is affected by CVE-2025-20223

Exploit Probability

EPSS
0.27%
Percentile
49.83%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.