Cyber Posture

CVE-2025-20156

Critical

Published: 22 January 2025

Published
22 January 2025
Modified
01 August 2025
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0347 87.6th percentile
Risk Priority 22 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability in the REST API of Cisco Meeting Management could allow a remote, authenticated attacker with low privileges to elevate privileges to administrator on an affected device. This vulnerability exists because proper authorization is not enforced upon REST API users. An attacker could exploit this vulnerability by sending API requests to a specific endpoint. A successful exploit could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management.

Security Summary

CVE-2025-20156 is a vulnerability in the REST API of Cisco Meeting Management that stems from a failure to enforce proper authorization on REST API users. This affects Cisco Meeting Management devices, enabling privilege escalation to administrator level on impacted systems, including edge nodes managed by the software.

A remote, authenticated attacker with low privileges can exploit the vulnerability by sending API requests to a specific endpoint. Successful exploitation allows the attacker to gain administrator-level control over edge nodes managed by Cisco Meeting Management, with a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and association to CWE-274.

Cisco has issued a security advisory (cisco-sa-cmm-privesc-uy2Vf8pc) addressing the vulnerability, along with related advisories on their security center.

Details

CWE(s)
CWE-274

Affected Products

cisco
meeting management
≤ 3.9.1

References