CVE-2025-20113 - Client-Side Enforcement of Server-Side Security

Severity

71%

Complexity

27%

Confidentiality

70%

A vulnerability in Cisco Unified Intelligence Center could allow an authenticated, remote attacker to elevate privileges to Administrator for a limited set of functions on an affected system. This vulnerability is due to insufficient server-side validation of user-supplied parameters in API or HTTP requests. An attacker could exploit this vulnerability by submitting a crafted API or HTTP request to an affected system. A successful exploit could allow the attacker to access, modify, or delete data beyond the sphere of their intended access level, including obtaining potentially sensitive information stored in the system.

CVSS 3.1 Base Score 7.1. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N).

Demo Examples

Client-Side Enforcement of Server-Side Security

CWE-602

This example contains client-side code that checks if the user authenticated successfully before sending a command. The server-side code performs the authentication in one step, and executes the command in a separate step.

CLIENT-SIDE (client.pl)


               
}
writeSocket($sock, "CHANGE-ADDRESS $username $address\n";# username/pass is valid, go ahead and update the info!
print "ERROR: Invalid Authentication!\n";

SERVER-SIDE (server.pl):


               
}
# does not close the socket on failure; assumes the# user will try again
}
writeSocket($sock, "SUCCESS\n");
writeSocket($sock, "FAILURE -- address is malformed\n");

The server accepts 2 commands, "AUTH" which authenticates the user, and "CHANGE-ADDRESS" which updates the address field for the username. The client performs the authentication and only sends a CHANGE-ADDRESS for that user if the authentication succeeds. Because the client has already performed the authentication, the server assumes that the username in the CHANGE-ADDRESS is the same as the authenticated user. An attacker could modify the client by removing the code that sends the "AUTH" command and simply executing the CHANGE-ADDRESS.

Overview

Type

Cisco Unified Contact Center Express

First reported 2 months ago

2025-05-21 17:15:00

Last updated 4 days ago

2025-07-22 14:41:00

Affected Software

Cisco Unified Contact Center Express 10.5(1)

10.5\(1\)

Cisco Unified Contact Center Express 10.6(1)

10.6\(1\)

Cisco Unified Contact Center Express 12.5(1)

12.5\(1\)

Cisco Unified Contact Center Express 12.0(1)

12.0\(1\)

Cisco Unified Contact Center Express 11.6(1)

11.6\(1\)

Cisco Unified Contact Center Express 11.6(2)

11.6\(2\)

Cisco Unified Contact Center Express (CCX) 12.0(1)ES03

12.0\(1\)es03

Cisco Unified Contact Center Express 11.6(2)es04

11.6\(2\)es04

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.