Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges

Posted on November 15, 2025November 15, 2025 By CWS

A severe safety flaw in Cisco Catalyst Heart Digital Equipment has been found that permits attackers with low-level entry to achieve full administrator management over affected methods.

The vulnerability, tracked as CVE-2025-20341, impacts digital home equipment operating on VMware ESXi and carries a excessive severity score with a CVSS rating of 8.8.

This flaw poses a significant danger to organizations utilizing these methods for community administration and monitoring.

The vulnerability stems from poor enter validation throughout the system. When customers submit information by means of internet requests, the software program fails to correctly verify and confirm the knowledge.

This oversight creates a chance for attackers to ship specifically designed HTTP requests that trick the system into granting them greater privileges.

The assault may be carried out remotely over the community, making it notably harmful for uncovered methods.

What makes this vulnerability regarding is that an attacker solely wants fundamental entry credentials to take advantage of it.

Somebody with Observer function permissions, that are sometimes given to customers who must view system data, can use this flaw to raise their privileges to Administrator degree.

As soon as they acquire administrator entry, attackers can create new person accounts, modify system settings, and carry out different unauthorized actions that compromise the safety of the whole community infrastructure.

Cisco safety researchers recognized this vulnerability throughout work on a assist case with the Technical Help Heart.

The corporate has confirmed that no public exploits have been noticed but, which provides organizations a window to patch their methods earlier than widespread assaults start.

Technical Particulars and Mitigation

The vulnerability impacts Cisco Catalyst Heart Digital Equipment variations 2.3.7.3-VA and later releases.

The safety flaw is rooted in inadequate validation mechanisms that course of user-supplied enter by means of HTTP requests.

When the system receives these crafted requests, it fails to correctly sanitize the information earlier than processing privilege escalation operations.

Cisco has launched model 2.3.7.10-VA because the fastened launch that addresses this safety challenge. Organizations operating affected variations ought to improve instantly to this patched model.

CVE IDCVSS ScoreAffected ProductVulnerable VersionsFixed VersionAttack VectorCVE-2025-203418.8 (Excessive)Cisco Catalyst Heart Digital Equipment (VMware ESXi)2.3.7.3-VA and later2.3.7.10-VANetwork (Distant)

The corporate has said that no workarounds can be found, making the software program replace the one efficient strategy to defend in opposition to this vulnerability.

{Hardware} home equipment and AWS-based digital home equipment will not be affected by this challenge.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Catalyst, Center, Cisco, Escalate, Priveleges, Vulnerability

Post navigation

Previous Post: PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild
Next Post: RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

Related Posts

EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections Cyber Security News
SimonMed Data Breach Exposes 1.2 Million Patients Sensitive Information Cyber Security News
Google Warns 2.5B Gmail Users to Reset Passwords Following Salesforce Data Breach Cyber Security News
Threat Actors Mimic as HR Departments to Steal Your Gmail Login Credentials Cyber Security News
Chinese ‘Salt Typhoon’ Hackers Hijacked US National Guard Network for Nearly a Year Cyber Security News
PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
  • Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges
  • PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild
  • Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers
  • RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
  • Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges
  • PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild
  • Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers
  • RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News