Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20346: Improper Privilege Management in Cisco Cisco Digital Network Architecture Center (DNA Center)

0
Medium
VulnerabilityCVE-2025-20346cvecve-2025-20346
Published: Thu Nov 13 2025 (11/13/2025, 16:27:30 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Digital Network Architecture Center (DNA Center)

Description

A vulnerability in Cisco Catalyst Center could allow an authenticated, remote attacker to execute operations that should require Administrator privileges. The attacker would need valid read-only user credentials. This vulnerability is due to improper role-based access control (RBAC). An attacker could exploit this vulnerability by logging in to an affected system and modifying certain policy configurations. A successful exploit could allow the attacker to modify policy configurations that are reserved for the Administrator role. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Observer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:49:54 UTC

Technical Analysis

CVE-2025-20346 is a vulnerability identified in Cisco Digital Network Architecture Center (DNA Center), a widely used network management and automation platform. The root cause is improper privilege management due to flawed role-based access control (RBAC) implementation. Specifically, users with read-only or Observer roles, which should have limited visibility and no modification rights, can exploit this vulnerability to perform administrative operations, including modifying critical policy configurations. This escalation of privileges occurs because the system fails to enforce strict separation of duties between Observer and Administrator roles. The attacker must be authenticated with valid credentials but does not require elevated privileges or additional user interaction. The vulnerability affects a broad range of Cisco DNA Center versions, including multiple AIRGAP and VA Launchpad releases, indicating a long-standing and widespread issue. The CVSS 3.1 base score is 4.3 (medium severity), with an attack vector of network (remote), low attack complexity, and privileges required at a low level (read-only user). The impact primarily affects integrity, allowing unauthorized changes to network policies, which could lead to misconfigurations, security policy bypass, or network disruptions. No known public exploits or active exploitation have been reported as of the publication date. Cisco has not provided explicit patch links in the provided data, so mitigation may rely on updates or configuration changes once available.

Potential Impact

The primary impact of this vulnerability is on the integrity of network management operations. Unauthorized modification of policy configurations by low-privileged users can lead to significant security risks, including the introduction of malicious policies, bypassing security controls, or disrupting network operations. This can compromise the overall security posture of organizations relying on Cisco DNA Center for centralized network management. While confidentiality and availability impacts are minimal or none, the ability to alter configurations without proper authorization can facilitate further attacks or cause operational outages. Organizations with large-scale network deployments or critical infrastructure managed via Cisco DNA Center are particularly vulnerable, as attackers could leverage this flaw to gain persistent footholds or cause cascading failures. The requirement for valid credentials limits exploitation to insiders or attackers who have compromised user accounts, but the ease of privilege escalation once inside makes this a serious concern. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as threat actors may develop exploits over time.

Mitigation Recommendations

1. Immediately audit all user accounts with Observer or read-only roles to ensure credentials are secure and access is justified. 2. Implement strict credential management policies, including multi-factor authentication (MFA) for all users accessing Cisco DNA Center. 3. Monitor and log all configuration changes within DNA Center, focusing on actions performed by low-privileged users to detect anomalous behavior. 4. Restrict network access to the DNA Center management interface to trusted administrative networks and VPNs to reduce exposure. 5. Apply Cisco's official patches or updates as soon as they become available; monitor Cisco advisories for patch releases addressing this vulnerability. 6. Consider implementing compensating controls such as network segmentation and role reassessment to minimize the risk of privilege escalation. 7. Conduct regular penetration testing and RBAC reviews to identify and remediate similar privilege management issues proactively. 8. Educate administrators and users about the risks of credential compromise and enforce least privilege principles rigorously.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.256Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69160aa2eb29b6dceb12146c

Added to database: 11/13/2025, 4:43:14 PM

Last enriched: 2/27/2026, 4:49:54 AM

Last updated: 3/24/2026, 12:41:55 AM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses