Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20163: Key Exchange without Entity Authentication in Cisco Cisco Data Center Network Manager

0
High
VulnerabilityCVE-2025-20163cvecve-2025-20163
Published: Wed Jun 04 2025 (06/04/2025, 16:17:44 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Data Center Network Manager

Description

A vulnerability in the SSH implementation of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an unauthenticated, remote attacker to impersonate Cisco NDFC-managed devices. This vulnerability is due to insufficient SSH host key validation. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections to Cisco NDFC-managed devices, which could allow an attacker to intercept this traffic. A successful exploit could allow the attacker to impersonate a managed device and capture user credentials.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:38:58 UTC

Technical Analysis

CVE-2025-20163 is a vulnerability discovered in the SSH implementation of Cisco Nexus Dashboard Fabric Controller (NDFC), a key component of Cisco Data Center Network Manager used for managing data center network devices. The root cause is insufficient validation of SSH host keys during key exchange, which undermines entity authentication. This weakness allows an unauthenticated remote attacker to perform a machine-in-the-middle (MitM) attack on SSH sessions between Cisco NDFC and managed devices. By intercepting and manipulating SSH traffic, the attacker can impersonate legitimate managed devices, potentially capturing sensitive information such as user credentials and command data. The vulnerability affects a broad range of Cisco NDFC versions spanning multiple major releases, indicating a long-standing issue. The CVSS v3.1 base score is 8.7, reflecting high severity due to network attack vector, no privileges or user interaction required, and a scope change that impacts confidentiality and integrity. Although no public exploits are known, the vulnerability poses a significant risk to the security of data center network management, where trust and secure communication between controllers and devices are critical. The vulnerability was publicly disclosed on June 4, 2025, and Cisco has not yet provided patch links, emphasizing the need for immediate attention and mitigation by affected organizations.

Potential Impact

The impact of CVE-2025-20163 is substantial for organizations relying on Cisco Data Center Network Manager for managing their data center infrastructure. Successful exploitation can lead to impersonation of managed devices, allowing attackers to intercept and manipulate sensitive network management traffic. This compromises the confidentiality and integrity of network operations, potentially exposing user credentials and enabling unauthorized command execution or configuration changes. Such breaches can disrupt network stability, lead to data exfiltration, and facilitate further lateral movement within the network. Given the critical role of NDFC in orchestrating data center networks, this vulnerability could affect availability indirectly by enabling attacks that degrade network performance or cause misconfigurations. The high CVSS score reflects the severity and ease of exploitation without authentication or user interaction, increasing the likelihood of targeted attacks against data centers, cloud providers, and enterprises with Cisco infrastructure.

Mitigation Recommendations

To mitigate CVE-2025-20163, organizations should immediately verify if their Cisco NDFC deployments run affected versions and prioritize upgrading to patched releases once available. In the interim, enforce strict SSH host key verification policies to prevent MitM attacks, including manual validation of host keys and use of SSH known_hosts files. Network segmentation should isolate management traffic to trusted zones, reducing exposure to attackers. Employ network intrusion detection systems (NIDS) to monitor for anomalous SSH activity and potential MitM indicators. Use multi-factor authentication (MFA) for accessing management consoles to limit credential compromise impact. Regularly audit and rotate credentials used by NDFC-managed devices. Additionally, consider deploying SSH key pinning or certificate-based authentication mechanisms if supported. Maintaining up-to-date threat intelligence and monitoring Cisco advisories for patches and updates is critical. Finally, conduct penetration testing and vulnerability assessments focused on SSH communications within the data center environment to identify and remediate weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.217Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6840745c182aa0cae2b579f7

Added to database: 6/4/2025, 4:29:16 PM

Last enriched: 2/26/2026, 8:38:58 PM

Last updated: 3/26/2026, 9:35:39 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses