Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20377: Exposure of Sensitive Information to an Unauthorized Actor in Cisco Cisco Packaged Contact Center Enterprise

0
Medium
VulnerabilityCVE-2025-20377cvecve-2025-20377
Published: Wed Nov 05 2025 (11/05/2025, 16:31:52 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Packaged Contact Center Enterprise

Description

A vulnerability in the API subsystem of Cisco Unified Intelligence Center could allow an authenticated, remote attacker to obtain sensitive information from an affected system. This vulnerability is due to improper validation of requests to certain API endpoints. An attacker could exploit this vulnerability by sending a valid request to a specific API endpoint within the affected system. A successful exploit could allow a low-privileged user to view sensitive information on the affected system that should be restricted. To exploit this vulnerability, the attacker must have valid user credentials on the affected system.

AI-Powered Analysis

AILast updated: 11/21/2025, 15:23:07 UTC

Technical Analysis

CVE-2025-20377 is a vulnerability identified in the API subsystem of Cisco Unified Intelligence Center, part of Cisco Packaged Contact Center Enterprise. The root cause is improper validation of requests sent to specific API endpoints, which allows an attacker with valid credentials but low privileges to retrieve sensitive information that should be restricted. The vulnerability affects numerous versions spanning from 10.5(1) to 15.0(1), indicating a broad impact across multiple product releases. The attack vector is remote network access, requiring authentication but no user interaction, making it feasible for insiders or compromised accounts to exploit. The CVSS v3.1 base score is 4.3 (medium), reflecting limited impact confined to confidentiality without affecting integrity or availability. The vulnerability does not require elevated privileges beyond a low-privileged user, increasing the risk of insider threats or lateral movement within an organization. No public exploits have been reported yet, but the exposure of sensitive data could facilitate further attacks or compliance violations. The vulnerability highlights the importance of robust API request validation and access control in contact center environments that handle sensitive customer and operational data.

Potential Impact

For European organizations, the exposure of sensitive information through this vulnerability could lead to significant privacy breaches, regulatory non-compliance (e.g., GDPR), and reputational damage. Contact centers often process personal data, payment information, and confidential customer interactions, so unauthorized access could compromise customer trust and lead to legal penalties. Although the vulnerability does not allow system manipulation or denial of service, the confidentiality breach alone is critical in sectors such as finance, healthcare, and telecommunications prevalent in Europe. Attackers exploiting this flaw could gain insights into internal operations or customer data, enabling targeted phishing, fraud, or identity theft. The requirement for valid credentials means that insider threats or compromised accounts pose the greatest risk. Organizations with large-scale Cisco contact center deployments could face widespread exposure if not promptly addressed.

Mitigation Recommendations

1. Apply Cisco-provided patches or updates as soon as they become available for all affected versions to remediate the vulnerability. 2. Restrict API access strictly to necessary users and systems using network segmentation, firewall rules, and zero-trust principles. 3. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 4. Regularly audit user privileges and remove unnecessary or outdated accounts with access to the Unified Intelligence Center. 5. Monitor API endpoint access logs for anomalous or unauthorized requests indicative of exploitation attempts. 6. Implement strict input validation and request filtering at the application and network layers to prevent malformed or unauthorized API calls. 7. Educate staff on credential security and insider threat awareness to minimize risk from low-privileged users. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious API activity. 9. Coordinate with Cisco support for guidance and to stay informed about emerging threats or patches related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690b8077ffac907e5bea79aa

Added to database: 11/5/2025, 4:51:03 PM

Last enriched: 11/21/2025, 3:23:07 PM

Last updated: 12/19/2025, 8:08:09 PM

Views: 206

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats