Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20341: Improper Access Control in Cisco Cisco Digital Network Architecture Center (DNA Center)

0
High
VulnerabilityCVE-2025-20341cvecve-2025-20341
Published: Thu Nov 13 2025 (11/13/2025, 16:18:03 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Digital Network Architecture Center (DNA Center)

Description

A vulnerability in Cisco Catalyst Center Virtual Appliance could allow an authenticated, remote attacker to elevate privileges to Administrator on an affected system. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to perform unauthorized modifications to the system, including creating new user accounts or elevating their own privileges on an affected system. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Observer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:49:41 UTC

Technical Analysis

CVE-2025-20341 is an improper access control vulnerability found in Cisco Digital Network Architecture Center (DNA Center) Virtual Appliance versions 2.3.7.5-VA through 2.3.7.9.75403.10-VA. The flaw arises from insufficient validation of user-supplied input, which an attacker with valid credentials at the Observer role or higher can exploit by sending specially crafted HTTP requests. This exploitation path allows privilege escalation to Administrator level, enabling unauthorized modifications such as creating new user accounts or elevating existing privileges. The vulnerability does not require user interaction but does require authentication with at least Observer privileges, which lowers the barrier for insider threats or compromised accounts. The CVSS v3.1 base score of 8.8 indicates a high-severity issue with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations relying on Cisco DNA Center for network management and automation. The affected versions are specific to the Virtual Appliance releases listed, and Cisco has not yet published patches, emphasizing the need for vigilant monitoring and interim mitigations.

Potential Impact

The impact of CVE-2025-20341 is substantial for organizations using Cisco DNA Center Virtual Appliance in their network infrastructure. Successful exploitation grants attackers Administrator-level privileges, compromising the confidentiality, integrity, and availability of the network management system. This can lead to unauthorized creation or modification of user accounts, potentially enabling persistent unauthorized access and lateral movement within the network. The attacker could manipulate network configurations, disrupt network operations, or exfiltrate sensitive network data. Given Cisco DNA Center's role in automating and managing complex enterprise networks, this vulnerability could severely disrupt business operations, cause data breaches, and undermine trust in network security. The requirement for valid credentials at the Observer level means insider threats or compromised low-privilege accounts pose a realistic risk. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code may emerge following public disclosure.

Mitigation Recommendations

Organizations should immediately identify and inventory all Cisco DNA Center Virtual Appliance instances running affected versions (2.3.7.5-VA through 2.3.7.9.75403.10-VA). Cisco should be monitored closely for official patches or updates addressing this vulnerability, and these should be applied promptly once available. Until patches are released, organizations should enforce strict access controls, limiting Observer role assignments to trusted personnel only and employing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Network segmentation should be implemented to isolate management appliances from general user networks and restrict access to the DNA Center interface to trusted IP addresses. Regular auditing of user accounts and privileges should be conducted to detect unauthorized changes. Additionally, monitoring and alerting on anomalous HTTP requests to the DNA Center appliance can help detect exploitation attempts. Incident response plans should be updated to include this vulnerability scenario, and staff should be trained to recognize signs of privilege escalation attacks within network management systems.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.255Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6916072eeb29b6dceb0d3f5b

Added to database: 11/13/2025, 4:28:30 PM

Last enriched: 2/27/2026, 4:49:41 AM

Last updated: 3/24/2026, 5:12:22 AM

Views: 216

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses