Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20113: Client-Side Enforcement of Server-Side Security in Cisco Cisco Unified Contact Center Express

0
High
VulnerabilityCVE-2025-20113cvecve-2025-20113
Published: Wed May 21 2025 (05/21/2025, 16:19:41 UTC)
Source: CVE
Vendor/Project: Cisco
Product: Cisco Unified Contact Center Express

Description

A vulnerability in Cisco Unified Intelligence Center could allow an authenticated, remote attacker to elevate privileges to Administrator for a limited set of functions on an affected system. This vulnerability is due to insufficient server-side validation of user-supplied parameters in API or HTTP requests. An attacker could exploit this vulnerability by submitting a crafted API or HTTP request to an affected system. A successful exploit could allow the attacker to access, modify, or delete data beyond the sphere of their intended access level, including obtaining potentially sensitive information stored in the system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:37:52 UTC

Technical Analysis

CVE-2025-20113 is a vulnerability identified in Cisco Unified Contact Center Express, specifically within the Cisco Unified Intelligence Center component. The root cause is the insufficient server-side validation of user-supplied parameters in API or HTTP requests. This weakness allows an authenticated remote attacker to craft malicious API or HTTP requests that bypass intended access controls, resulting in privilege escalation to Administrator level for a limited set of functions. The vulnerability affects a broad range of Cisco Unified Contact Center Express versions, from 8.5(1) through multiple 12.5(1) service updates and special releases, indicating a long-standing and widespread exposure. The attack vector requires network access and valid user credentials but does not require user interaction, making it feasible for insiders or attackers who have compromised low-privilege accounts. Successful exploitation can lead to unauthorized access, modification, or deletion of sensitive data, potentially impacting confidentiality and integrity of contact center operations. The CVSS v3.1 score is 7.1 (high), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and high confidentiality impact with limited integrity impact and no availability impact. There are no known public exploits or patches currently available, emphasizing the need for proactive mitigation. The vulnerability highlights the risk of relying on client-side enforcement of security policies without robust server-side validation, a common security design flaw.

Potential Impact

The impact of CVE-2025-20113 is significant for organizations using Cisco Unified Contact Center Express, particularly those relying on it for critical customer interaction and data management. An attacker with valid credentials but limited privileges can escalate to Administrator-level access for certain functions, enabling unauthorized access to sensitive customer data, internal configurations, and operational information. This can lead to data breaches, manipulation or deletion of contact center data, disruption of service integrity, and potential compliance violations related to data protection regulations. The confidentiality impact is high as sensitive information could be exposed or exfiltrated. Integrity is moderately affected due to possible unauthorized modifications, while availability is not impacted directly. The vulnerability could facilitate insider threats or lateral movement by attackers who have compromised low-privilege accounts. Given the widespread deployment of Cisco Unified Contact Center Express in enterprises globally, the potential for large-scale impact exists, especially in sectors like finance, healthcare, telecommunications, and government where contact centers handle sensitive data. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability is publicly known.

Mitigation Recommendations

To mitigate CVE-2025-20113, organizations should: 1) Monitor Cisco’s official advisories closely and apply security patches or updates as soon as they become available to address the server-side validation flaw. 2) Restrict access to Cisco Unified Contact Center Express management interfaces and APIs to trusted networks and users, employing network segmentation and firewall rules to limit exposure. 3) Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 4) Implement strict role-based access controls (RBAC) and regularly audit user privileges to ensure least privilege principles are maintained. 5) Enable detailed logging and monitoring of API and HTTP request activity to detect anomalous or unauthorized access attempts promptly. 6) Conduct regular security assessments and penetration testing focused on API endpoints to identify similar weaknesses. 7) Educate administrators and users about the risks of privilege escalation and the importance of credential security. 8) Consider deploying Web Application Firewalls (WAFs) or API gateways with custom rules to detect and block suspicious crafted requests targeting the vulnerable parameters. These measures collectively reduce the attack surface and limit the potential for exploitation until patches are applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.210Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682e0169c4522896dcc0f068

Added to database: 5/21/2025, 4:38:01 PM

Last enriched: 2/26/2026, 8:37:52 PM

Last updated: 3/24/2026, 8:44:55 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses