A newly disclosed high-severity vulnerability in the Cisco Catalyst Center Virtual Appliance could allow attackers with low-level access to elevate their privileges to full administrative control, according to a security advisory published by Cisco. Tracked as CVE-2025-20341 and assigned a CVSS score of 8.8, the flaw stems from improper validation of user-supplied input.
Cisco explains that “a vulnerability in Cisco Catalyst Center Virtual Appliance could allow an authenticated, remote attacker to elevate privileges to Administrator on an affected system.”
The advisory notes that the issue is triggered when an attacker submits a specially crafted HTTP request. Cisco states that the flaw exists “due to insufficient validation of user-supplied input”, adding that “an attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system.”
Although the attacker must already possess a valid account, only the lowest-level Observer privileges are needed. A successful compromise could enable full administrative control.
Cisco warns, “A successful exploit could allow the attacker to perform unauthorized modifications to the system, including creating new user accounts or elevating their own privileges.”
The vulnerability impacts specific versions of the Catalyst Center Virtual Appliance:
| Cisco Catalyst Center Version | Status |
|---|---|
| Earlier than 2.3.7.3-VA | Not vulnerable |
| 2.3.7.3-VA and later | Vulnerable; fixed in 2.3.7.10-VA |
| 3.1 | Not vulnerable |
Cisco has released patched software for affected deployments and urges administrators to update immediately.
As of the advisory date, there is no evidence that the vulnerability has been publicly exploited.
Related Posts:
- MediaTek July 2025 Security Bulletin: Heap Overflows, WLAN Flaws, and Bluetooth Risks Threaten Billions of Devices
- Cisco Catalyst SD-WAN Manager Unauthorized Access Vulnerability
- Critical CVE-2025-20188 (CVSS 10) Flaw in Cisco IOS XE WLCs Allows Remote Root Access
- Critical EoP Flaw in Microsoft’s Remote Registry: Researcher Publishes PoC for CVE-2024-43532
- CVE-2024-20418 (CVSS 10): Cisco URWB Access Points Vulnerable to Remote Takeover