Admin security vulnerability threatens Cisco Catalyst Center

Security updates close several vulnerabilities in Cisco's network control center Catalyst Center.

listen Print view
A symbolic update inscription.

(Image: heise online)

2 min. read

Attackers can gain administrator privileges by successfully exploiting a security vulnerability in Cisco's Catalyst Center. The developers have now closed this and other vulnerabilities. So far, there are no reports of attacks. However, this could change quickly.

Admins manage networks with Catalyst Center. Because attacks at such a point are very damaging, the software should be updated promptly. The most dangerous is considered to be a vulnerability (CVE-2025-20341 “high”) through which remote attackers can escalate to admin. However, this only works if they are already authenticated as at least an observer.

Once this hurdle is overcome, they can initiate attacks with prepared HTTP requests. Due to insufficient checks, these are processed, and errors occur. Subsequently, attackers can create new accounts. In a warning message, the developers state that only Catalyst Center from version 2.3.7.3-VA is exclusively affected. Previous versions and 3.1 are not threatened. Version 2.3.7.10-VA contains a security patch.

The remaining software vulnerabilities (CVE-2025-20341, CVE-2025-20349, CVE-2025-20353, CVE-2025-20355, CVE-2025-20346) are classified with the threat level “medium.” If attacks are successful at these points, attackers can, among other things, escalate to root user. However, for this to work, they must already be logged into systems.

Videos by heise

Admins can find further information in the linked warning messages from the network equipment manufacturer.

The list of vulnerabilities sorted by threat level in descending order:

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.