CVE-2025-20210 (GCVE-0-2025-20210)
Vulnerability from cvelistv5 – Published: 2025-05-07 17:16 – Updated: 2025-05-07 19:48
VLAI?
Summary
A vulnerability in the management API of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to read and modify the outgoing proxy configuration settings.
This vulnerability is due to the lack of authentication in an API endpoint. An attacker could exploit this vulnerability by sending a request to the affected API of a Catalyst Center device. A successful exploit could allow the attacker to view or modify the outgoing proxy configuration, which could disrupt internet traffic from Cisco Catalyst Center or may allow the attacker to intercept outbound internet traffic.
Severity ?
7.3 (High)
CWE
- CWE-306 - Missing Authentication for Critical Function
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Digital Network Architecture Center (DNA Center) |
Affected:
2.1.1.0
Affected: 2.1.1.3 Affected: 2.1.2.0 Affected: 2.1.2.3 Affected: 2.1.2.4 Affected: 2.1.2.5 Affected: 2.2.1.0 Affected: 2.1.2.6 Affected: 2.2.2.0 Affected: 2.2.2.1 Affected: 2.2.2.3 Affected: 2.1.2.7 Affected: 2.2.1.3 Affected: 2.2.3.0 Affected: 2.2.2.4 Affected: 2.2.2.5 Affected: 2.2.3.3 Affected: 2.2.2.7 Affected: 2.2.2.6 Affected: 2.2.2.8 Affected: 2.2.3.4 Affected: 2.1.2.8 Affected: 2.3.2.1 Affected: 2.3.2.1-AIRGAP Affected: 2.3.2.1-AIRGAP-CA Affected: 2.2.3.5 Affected: 2.3.3.0 Affected: 2.3.3.3 Affected: 2.3.3.1-AIRGAP Affected: 2.3.3.1 Affected: 2.3.2.3 Affected: 2.3.3.3-AIRGAP Affected: 2.2.3.6 Affected: 2.2.2.9 Affected: 2.3.3.0-AIRGAP Affected: 2.3.3.3-AIRGAP-CA Affected: 2.3.3.4 Affected: 2.3.3.4-AIRGAP Affected: 2.3.3.4-AIRGAP-MDNAC Affected: 2.3.3.4-HF1 Affected: 2.3.4.0 Affected: 2.3.3.5 Affected: 2.3.3.5-AIRGAP Affected: 2.3.4.0-AIRGAP Affected: 2.3.4.3 Affected: 2.3.4.3-AIRGAP Affected: 2.3.3.6 Affected: 2.3.5.0 Affected: 2.3.3.6-AIRGAP Affected: 2.3.5.0-AIRGAP Affected: 2.3.3.6-AIRGAP-MDNAC Affected: 2.3.5.0-AIRGAP-MDNAC Affected: 2.3.3.7 Affected: 2.3.3.7-AIRGAP Affected: 2.3.3.7-AIRGAP-MDNAC Affected: 2.3.6.0 Affected: 2.3.3.6-70045-HF1 Affected: 2.3.3.7-72328-AIRGAP Affected: 2.3.3.7-72323 Affected: 2.3.3.7-72328-MDNAC Affected: 2.3.5.3 Affected: 2.3.5.3-AIRGAP-MDNAC Affected: 2.3.5.3-AIRGAP Affected: 2.3.6.0-AIRGAP Affected: 2.3.7.0 Affected: 2.3.7.0-AIRGAP Affected: 2.3.7.0-AIRGAP-MDNAC Affected: 2.3.7.0-VA Affected: 2.3.5.4 Affected: 2.3.5.4-AIRGAP Affected: 2.3.5.4-AIRGAP-MDNAC Affected: 2.3.7.3 Affected: 2.3.7.3-AIRGAP Affected: 2.3.7.3-AIRGAP-MDNAC Affected: 2.3.5.5-AIRGAP Affected: 2.3.5.5 Affected: 2.3.5.5-AIRGAP-MDNAC Affected: 2.3.7.4 Affected: 2.3.7.4-AIRGAP Affected: 2.3.7.4-AIRGAP-MDNAC Affected: 2.3.7.5-AIRGAP Affected: 2.3.7.5-VA Affected: 2.3.5.6-AIRGAP Affected: 2.3.5.6 Affected: 2.3.5.6-AIRGAP-MDNAC Affected: 2.3.7.6-AIRGAP Affected: 2.3.7.6 Affected: 2.3.7.6-VA Affected: 2.3.5.5-70026-HF70 Affected: 2.3.5.5-70026-HF51 Affected: 2.3.5.6-70143-HF20 Affected: 2.3.7.6-AIRGAP-MDNAC Affected: 2.3.5.5-70026-HF52 Affected: 2.3.5.5-70026-HF53 Affected: 2.3.5.5-70026-HF71 Affected: 2.3.7.7 Affected: 2.3.7.7-VA Affected: 2.3.7.7-AIRGAP Affected: 2.3.7.7-AIRGAP-MDNAC Affected: 2.3.5.5-70026-HF72 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-20210",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-07T18:57:07.111143Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-07T19:48:12.129Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco Digital Network Architecture Center (DNA Center)",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "2.1.1.0"
},
{
"status": "affected",
"version": "2.1.1.3"
},
{
"status": "affected",
"version": "2.1.2.0"
},
{
"status": "affected",
"version": "2.1.2.3"
},
{
"status": "affected",
"version": "2.1.2.4"
},
{
"status": "affected",
"version": "2.1.2.5"
},
{
"status": "affected",
"version": "2.2.1.0"
},
{
"status": "affected",
"version": "2.1.2.6"
},
{
"status": "affected",
"version": "2.2.2.0"
},
{
"status": "affected",
"version": "2.2.2.1"
},
{
"status": "affected",
"version": "2.2.2.3"
},
{
"status": "affected",
"version": "2.1.2.7"
},
{
"status": "affected",
"version": "2.2.1.3"
},
{
"status": "affected",
"version": "2.2.3.0"
},
{
"status": "affected",
"version": "2.2.2.4"
},
{
"status": "affected",
"version": "2.2.2.5"
},
{
"status": "affected",
"version": "2.2.3.3"
},
{
"status": "affected",
"version": "2.2.2.7"
},
{
"status": "affected",
"version": "2.2.2.6"
},
{
"status": "affected",
"version": "2.2.2.8"
},
{
"status": "affected",
"version": "2.2.3.4"
},
{
"status": "affected",
"version": "2.1.2.8"
},
{
"status": "affected",
"version": "2.3.2.1"
},
{
"status": "affected",
"version": "2.3.2.1-AIRGAP"
},
{
"status": "affected",
"version": "2.3.2.1-AIRGAP-CA"
},
{
"status": "affected",
"version": "2.2.3.5"
},
{
"status": "affected",
"version": "2.3.3.0"
},
{
"status": "affected",
"version": "2.3.3.3"
},
{
"status": "affected",
"version": "2.3.3.1-AIRGAP"
},
{
"status": "affected",
"version": "2.3.3.1"
},
{
"status": "affected",
"version": "2.3.2.3"
},
{
"status": "affected",
"version": "2.3.3.3-AIRGAP"
},
{
"status": "affected",
"version": "2.2.3.6"
},
{
"status": "affected",
"version": "2.2.2.9"
},
{
"status": "affected",
"version": "2.3.3.0-AIRGAP"
},
{
"status": "affected",
"version": "2.3.3.3-AIRGAP-CA"
},
{
"status": "affected",
"version": "2.3.3.4"
},
{
"status": "affected",
"version": "2.3.3.4-AIRGAP"
},
{
"status": "affected",
"version": "2.3.3.4-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.3.4-HF1"
},
{
"status": "affected",
"version": "2.3.4.0"
},
{
"status": "affected",
"version": "2.3.3.5"
},
{
"status": "affected",
"version": "2.3.3.5-AIRGAP"
},
{
"status": "affected",
"version": "2.3.4.0-AIRGAP"
},
{
"status": "affected",
"version": "2.3.4.3"
},
{
"status": "affected",
"version": "2.3.4.3-AIRGAP"
},
{
"status": "affected",
"version": "2.3.3.6"
},
{
"status": "affected",
"version": "2.3.5.0"
},
{
"status": "affected",
"version": "2.3.3.6-AIRGAP"
},
{
"status": "affected",
"version": "2.3.5.0-AIRGAP"
},
{
"status": "affected",
"version": "2.3.3.6-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.5.0-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.3.7"
},
{
"status": "affected",
"version": "2.3.3.7-AIRGAP"
},
{
"status": "affected",
"version": "2.3.3.7-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.6.0"
},
{
"status": "affected",
"version": "2.3.3.6-70045-HF1"
},
{
"status": "affected",
"version": "2.3.3.7-72328-AIRGAP"
},
{
"status": "affected",
"version": "2.3.3.7-72323"
},
{
"status": "affected",
"version": "2.3.3.7-72328-MDNAC"
},
{
"status": "affected",
"version": "2.3.5.3"
},
{
"status": "affected",
"version": "2.3.5.3-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.5.3-AIRGAP"
},
{
"status": "affected",
"version": "2.3.6.0-AIRGAP"
},
{
"status": "affected",
"version": "2.3.7.0"
},
{
"status": "affected",
"version": "2.3.7.0-AIRGAP"
},
{
"status": "affected",
"version": "2.3.7.0-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.7.0-VA"
},
{
"status": "affected",
"version": "2.3.5.4"
},
{
"status": "affected",
"version": "2.3.5.4-AIRGAP"
},
{
"status": "affected",
"version": "2.3.5.4-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.7.3"
},
{
"status": "affected",
"version": "2.3.7.3-AIRGAP"
},
{
"status": "affected",
"version": "2.3.7.3-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.5.5-AIRGAP"
},
{
"status": "affected",
"version": "2.3.5.5"
},
{
"status": "affected",
"version": "2.3.5.5-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.7.4"
},
{
"status": "affected",
"version": "2.3.7.4-AIRGAP"
},
{
"status": "affected",
"version": "2.3.7.4-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.7.5-AIRGAP"
},
{
"status": "affected",
"version": "2.3.7.5-VA"
},
{
"status": "affected",
"version": "2.3.5.6-AIRGAP"
},
{
"status": "affected",
"version": "2.3.5.6"
},
{
"status": "affected",
"version": "2.3.5.6-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.7.6-AIRGAP"
},
{
"status": "affected",
"version": "2.3.7.6"
},
{
"status": "affected",
"version": "2.3.7.6-VA"
},
{
"status": "affected",
"version": "2.3.5.5-70026-HF70"
},
{
"status": "affected",
"version": "2.3.5.5-70026-HF51"
},
{
"status": "affected",
"version": "2.3.5.6-70143-HF20"
},
{
"status": "affected",
"version": "2.3.7.6-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.5.5-70026-HF52"
},
{
"status": "affected",
"version": "2.3.5.5-70026-HF53"
},
{
"status": "affected",
"version": "2.3.5.5-70026-HF71"
},
{
"status": "affected",
"version": "2.3.7.7"
},
{
"status": "affected",
"version": "2.3.7.7-VA"
},
{
"status": "affected",
"version": "2.3.7.7-AIRGAP"
},
{
"status": "affected",
"version": "2.3.7.7-AIRGAP-MDNAC"
},
{
"status": "affected",
"version": "2.3.5.5-70026-HF72"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the management API of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to read and modify the outgoing proxy configuration settings.\r\n\r\nThis vulnerability is due to the lack of authentication in an API endpoint. An attacker could exploit this vulnerability by sending a request to the affected API of a Catalyst Center device. A successful exploit could allow the attacker to view or modify the outgoing proxy configuration, which could disrupt internet traffic from Cisco Catalyst Center or may allow the attacker to intercept outbound internet traffic."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "Missing Authentication for Critical Function",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-07T17:16:52.708Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-dnac-api-nBPZcJCM",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-api-nBPZcJCM"
}
],
"source": {
"advisory": "cisco-sa-dnac-api-nBPZcJCM",
"defects": [
"CSCwn10252"
],
"discovery": "EXTERNAL"
},
"title": "Cisco Catalyst Center Unprotected API Endpoint"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2025-20210",
"datePublished": "2025-05-07T17:16:52.708Z",
"dateReserved": "2024-10-10T19:15:13.231Z",
"dateUpdated": "2025-05-07T19:48:12.129Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-20210\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2025-05-07T18:15:41.240\",\"lastModified\":\"2025-08-13T19:05:32.047\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the management API of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to read and modify the outgoing proxy configuration settings.\\r\\n\\r\\nThis vulnerability is due to the lack of authentication in an API endpoint. An attacker could exploit this vulnerability by sending a request to the affected API of a Catalyst Center device. A successful exploit could allow the attacker to view or modify the outgoing proxy configuration, which could disrupt internet traffic from Cisco Catalyst Center or may allow the attacker to intercept outbound internet traffic.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la API de administraci\u00f3n de Cisco Catalyst Center, anteriormente Cisco DNA Center, podr\u00eda permitir que un atacante remoto no autenticado lea y modifique la configuraci\u00f3n del proxy saliente. Esta vulnerabilidad se debe a la falta de autenticaci\u00f3n en un endpoint de la API. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una solicitud a la API afectada de un dispositivo Catalyst Center. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ver o modificar la configuraci\u00f3n del proxy saliente, lo que podr\u00eda interrumpir el tr\u00e1fico de internet de Cisco Catalyst Center o interceptar el tr\u00e1fico saliente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_center:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.3.7.9\",\"matchCriteriaId\":\"82E4F91B-C188-473E-8B68-8FB39016D2A8\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-api-nBPZcJCM\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-20210\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-07T18:57:07.111143Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-07T18:57:08.738Z\"}}], \"cna\": {\"title\": \"Cisco Catalyst Center Unprotected API Endpoint\", \"source\": {\"defects\": [\"CSCwn10252\"], \"advisory\": \"cisco-sa-dnac-api-nBPZcJCM\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Digital Network Architecture Center (DNA Center)\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.1.1.0\"}, {\"status\": \"affected\", \"version\": \"2.1.1.3\"}, {\"status\": \"affected\", \"version\": \"2.1.2.0\"}, {\"status\": \"affected\", \"version\": \"2.1.2.3\"}, {\"status\": \"affected\", \"version\": \"2.1.2.4\"}, {\"status\": \"affected\", \"version\": \"2.1.2.5\"}, {\"status\": \"affected\", \"version\": \"2.2.1.0\"}, {\"status\": \"affected\", \"version\": \"2.1.2.6\"}, {\"status\": \"affected\", \"version\": \"2.2.2.0\"}, {\"status\": \"affected\", \"version\": \"2.2.2.1\"}, {\"status\": \"affected\", \"version\": \"2.2.2.3\"}, {\"status\": \"affected\", \"version\": \"2.1.2.7\"}, {\"status\": \"affected\", \"version\": \"2.2.1.3\"}, {\"status\": \"affected\", \"version\": \"2.2.3.0\"}, {\"status\": \"affected\", \"version\": \"2.2.2.4\"}, {\"status\": \"affected\", \"version\": \"2.2.2.5\"}, {\"status\": \"affected\", \"version\": \"2.2.3.3\"}, {\"status\": \"affected\", \"version\": \"2.2.2.7\"}, {\"status\": \"affected\", \"version\": \"2.2.2.6\"}, {\"status\": \"affected\", \"version\": \"2.2.2.8\"}, {\"status\": \"affected\", \"version\": \"2.2.3.4\"}, {\"status\": \"affected\", \"version\": \"2.1.2.8\"}, {\"status\": \"affected\", \"version\": \"2.3.2.1\"}, {\"status\": \"affected\", \"version\": \"2.3.2.1-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.2.1-AIRGAP-CA\"}, {\"status\": \"affected\", \"version\": \"2.2.3.5\"}, {\"status\": \"affected\", \"version\": \"2.3.3.0\"}, {\"status\": \"affected\", \"version\": \"2.3.3.3\"}, {\"status\": \"affected\", \"version\": \"2.3.3.1-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.3.1\"}, {\"status\": \"affected\", \"version\": \"2.3.2.3\"}, {\"status\": \"affected\", \"version\": \"2.3.3.3-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.2.3.6\"}, {\"status\": \"affected\", \"version\": \"2.2.2.9\"}, {\"status\": \"affected\", \"version\": \"2.3.3.0-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.3.3-AIRGAP-CA\"}, {\"status\": \"affected\", \"version\": \"2.3.3.4\"}, {\"status\": \"affected\", \"version\": \"2.3.3.4-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.3.4-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.3.4-HF1\"}, {\"status\": \"affected\", \"version\": \"2.3.4.0\"}, {\"status\": \"affected\", \"version\": \"2.3.3.5\"}, {\"status\": \"affected\", \"version\": \"2.3.3.5-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.4.0-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.4.3\"}, {\"status\": \"affected\", \"version\": \"2.3.4.3-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.3.6\"}, {\"status\": \"affected\", \"version\": \"2.3.5.0\"}, {\"status\": \"affected\", \"version\": \"2.3.3.6-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.5.0-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.3.6-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.5.0-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.3.7\"}, {\"status\": \"affected\", \"version\": \"2.3.3.7-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.3.7-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.6.0\"}, {\"status\": \"affected\", \"version\": \"2.3.3.6-70045-HF1\"}, {\"status\": \"affected\", \"version\": \"2.3.3.7-72328-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.3.7-72323\"}, {\"status\": \"affected\", \"version\": \"2.3.3.7-72328-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.5.3\"}, {\"status\": \"affected\", \"version\": \"2.3.5.3-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.5.3-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.6.0-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.7.0\"}, {\"status\": \"affected\", \"version\": \"2.3.7.0-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.7.0-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.7.0-VA\"}, {\"status\": \"affected\", \"version\": \"2.3.5.4\"}, {\"status\": \"affected\", \"version\": \"2.3.5.4-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.5.4-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.7.3\"}, {\"status\": \"affected\", \"version\": \"2.3.7.3-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.7.3-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.5.5-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.5.5\"}, {\"status\": \"affected\", \"version\": \"2.3.5.5-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.7.4\"}, {\"status\": \"affected\", \"version\": \"2.3.7.4-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.7.4-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.7.5-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.7.5-VA\"}, {\"status\": \"affected\", \"version\": \"2.3.5.6-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.5.6\"}, {\"status\": \"affected\", \"version\": \"2.3.5.6-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.7.6-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.7.6\"}, {\"status\": \"affected\", \"version\": \"2.3.7.6-VA\"}, {\"status\": \"affected\", \"version\": \"2.3.5.5-70026-HF70\"}, {\"status\": \"affected\", \"version\": \"2.3.5.5-70026-HF51\"}, {\"status\": \"affected\", \"version\": \"2.3.5.6-70143-HF20\"}, {\"status\": \"affected\", \"version\": \"2.3.7.6-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.5.5-70026-HF52\"}, {\"status\": \"affected\", \"version\": \"2.3.5.5-70026-HF53\"}, {\"status\": \"affected\", \"version\": \"2.3.5.5-70026-HF71\"}, {\"status\": \"affected\", \"version\": \"2.3.7.7\"}, {\"status\": \"affected\", \"version\": \"2.3.7.7-VA\"}, {\"status\": \"affected\", \"version\": \"2.3.7.7-AIRGAP\"}, {\"status\": \"affected\", \"version\": \"2.3.7.7-AIRGAP-MDNAC\"}, {\"status\": \"affected\", \"version\": \"2.3.5.5-70026-HF72\"}], \"defaultStatus\": \"unknown\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-api-nBPZcJCM\", \"name\": \"cisco-sa-dnac-api-nBPZcJCM\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the management API of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to read and modify the outgoing proxy configuration settings.\\r\\n\\r\\nThis vulnerability is due to the lack of authentication in an API endpoint. An attacker could exploit this vulnerability by sending a request to the affected API of a Catalyst Center device. A successful exploit could allow the attacker to view or modify the outgoing proxy configuration, which could disrupt internet traffic from Cisco Catalyst Center or may allow the attacker to intercept outbound internet traffic.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-306\", \"description\": \"Missing Authentication for Critical Function\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2025-05-07T17:16:52.708Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-20210\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-07T19:48:12.129Z\", \"dateReserved\": \"2024-10-10T19:15:13.231Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2025-05-07T17:16:52.708Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…