Remote Command Execution Vulnerability in Cisco Catalyst Center REST API
CVE-2025-20349

6.3MEDIUM

Key Information:

Vendor

Cisco

Vendor
CVE Published:
13 November 2025

Badges

👾 Exploit Exists

What is CVE-2025-20349?

A vulnerability exists within the REST API of Cisco Catalyst Center, allowing an authenticated remote attacker to execute arbitrary commands with root privileges in a restricted container. This exploit emerges from inadequate validation of user-supplied input in API request parameters. An attacker with valid credentials, possessing at least Observer role access, can leverage this flaw by sending specially crafted API requests, potentially leading to unauthorized command execution that can compromise the integrity of the system.

Affected Version(s)

Cisco Digital Network Architecture Center (DNA Center) 1.4.0.0

Cisco Digital Network Architecture Center (DNA Center) 2.1.1.0

Cisco Digital Network Architecture Center (DNA Center) 2.1.1.3

References

CVSS V3.1

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-20349 : Remote Command Execution Vulnerability in Cisco Catalyst Center REST API