SB2025111372 - Multiple vulnerabilities in in Cisco Catalyst Center
Published: November 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) OS Command Injection (CVE-ID: CVE-2025-20349)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to improper input validation in REST API request parameters. A remote authenticated user can pass specially crafted request to the affected API endpoint and execute arbitrary OS commands as root.
2) Cross-site scripting (CVE-ID: CVE-2025-20353)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Improper privilege management (CVE-ID: CVE-2025-20346)
The vulnerability allows a remote user to escalate privileges.
The vulnerability exists due to improper privilege management. A remote low-privileged user can modify policy configurations that are reserved for the Administrator role.
Remediation
Install update from vendor's website.
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ci-ZWLQVSwT
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwo77762
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-xss-weXtVZ59
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwn51440
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-privesc-catc-rYjReeLU
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwo05088