CVE-2025-20114
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2025
Last modified:
22/07/2025
Description
A vulnerability in the API of Cisco Unified Intelligence Center could allow an authenticated, remote attacker to perform a horizontal privilege escalation attack on an affected system.<br />
<br />
This vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by submitting crafted API requests to an affected system to execute an insecure direct object reference attack. A successful exploit could allow the attacker to access specific data that is associated with different users on the affected system.
Impact
Base Score 3.x
4.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:unified_intelligence_center:10.5\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_intelligence_center:11.0\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_intelligence_center:11.0\(2\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_intelligence_center:11.0\(3\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_intelligence_center:11.5\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_intelligence_center:11.6\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_intelligence_center:12.0\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_intelligence_center:12.5\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_intelligence_center:12.5\(1\)su:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_intelligence_center:12.6\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_intelligence_center:12.6\(1\)_es05_et:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_intelligence_center:12.6\(1\)_et:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_intelligence_center:12.6\(2\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_contact_center_express:8.5\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_contact_center_express:9.0\(2\)su3es04:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



