Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges

Posted on November 15, 2025November 15, 2025 By CWS

A severe safety flaw in Cisco Catalyst Heart Digital Equipment has been found that permits attackers with low-level entry to achieve full administrator management over affected methods.

The vulnerability, tracked as CVE-2025-20341, impacts digital home equipment operating on VMware ESXi and carries a excessive severity score with a CVSS rating of 8.8.

This flaw poses a significant danger to organizations utilizing these methods for community administration and monitoring.

The vulnerability stems from poor enter validation throughout the system. When customers submit information by means of internet requests, the software program fails to correctly verify and confirm the knowledge.

This oversight creates a chance for attackers to ship specifically designed HTTP requests that trick the system into granting them greater privileges.

The assault may be carried out remotely over the community, making it notably harmful for uncovered methods.

What makes this vulnerability regarding is that an attacker solely wants fundamental entry credentials to take advantage of it.

Somebody with Observer function permissions, that are sometimes given to customers who must view system data, can use this flaw to raise their privileges to Administrator degree.

As soon as they acquire administrator entry, attackers can create new person accounts, modify system settings, and carry out different unauthorized actions that compromise the safety of the whole community infrastructure.

Cisco safety researchers recognized this vulnerability throughout work on a assist case with the Technical Help Heart.

The corporate has confirmed that no public exploits have been noticed but, which provides organizations a window to patch their methods earlier than widespread assaults start.

Technical Particulars and Mitigation

The vulnerability impacts Cisco Catalyst Heart Digital Equipment variations 2.3.7.3-VA and later releases.

The safety flaw is rooted in inadequate validation mechanisms that course of user-supplied enter by means of HTTP requests.

When the system receives these crafted requests, it fails to correctly sanitize the information earlier than processing privilege escalation operations.

Cisco has launched model 2.3.7.10-VA because the fastened launch that addresses this safety challenge. Organizations operating affected variations ought to improve instantly to this patched model.

CVE IDCVSS ScoreAffected ProductVulnerable VersionsFixed VersionAttack VectorCVE-2025-203418.8 (Excessive)Cisco Catalyst Heart Digital Equipment (VMware ESXi)2.3.7.3-VA and later2.3.7.10-VANetwork (Distant)

The corporate has said that no workarounds can be found, making the software program replace the one efficient strategy to defend in opposition to this vulnerability.

{Hardware} home equipment and AWS-based digital home equipment will not be affected by this challenge.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Catalyst, Center, Cisco, Escalate, Priveleges, Vulnerability

Post navigation

Previous Post: PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild
Next Post: RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

Related Posts

HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks Cyber Security News
Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability Cyber Security News
Microsoft Unveils New Tool to Migrate VMware Virtual Machines From vCenter to Hyper-V Cyber Security News
5 Deception Solutions that are Changing the Cybersecurity Game  Cyber Security News
Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location Cyber Security News
CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
  • Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges
  • PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild
  • Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers
  • RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
  • Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges
  • PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild
  • Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers
  • RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News