Posted in

Cisco Catalyst Center Security Flaw: CVE-2025-20341 Overview

A serious security vulnerability has been discovered in Cisco Catalyst Center Virtual Appliance, allowing attackers with low-level access to escalate privileges and gain full administrator control.

This flaw, tracked as CVE-2025-20341, carries a CVSS score of 8.8 (High) and poses a major risk to organizations using these appliances for network management.


What is CVE-2025-20341?

The vulnerability affects Cisco Catalyst Center Virtual Appliances running on VMware ESXi. It stems from poor input validation in HTTP request handling.

Attackers can send specially crafted HTTP requests that bypass validation checks, tricking the system into granting elevated privileges.


Why is this vulnerability critical?

  • Remote exploitation possible: Attack can be launched over the network.
  • Minimal access required: Even users with Observer role can exploit it.
  • Full control after exploitation: Attackers can:
    • Create new accounts
    • Modify system settings
    • Compromise network infrastructure

Technical Details

  • CVE ID: CVE-2025-20341
  • CVSS Score: 8.8 (High)
  • Affected Product: Cisco Catalyst Center Virtual Appliance (VMware ESXi)
  • Vulnerable Versions: 2.3.7.3-VA and later
  • Fixed Version: 2.3.7.10-VA
  • Attack Vector: Network (Remote)
CVE IDCVSS ScoreProductVulnerable VersionsFixed VersionAttack Vector
CVE-2025-203418.8 (High)Cisco Catalyst Center Virtual Appliance2.3.7.3-VA and later2.3.7.10-VANetwork

How to Mitigate the Risk

  • Update immediately: Cisco released version 2.3.7.10-VA to patch the flaw.
  • No workarounds available: The update is the only effective solution.
  • Not affected: Hardware appliances and AWS-based virtual appliances.

FAQ

Are there public exploits yet?
No, Cisco reports no known exploits at this time.

Who is at risk?
Organizations running Cisco Catalyst Center Virtual Appliances on VMware ESXi.

How urgent is the update?
Critical – patch immediately to prevent remote attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *