{"uuid": "50923696-57b2-4846-b7cd-5d85dd3536d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20156", "type": "seen", "source": "https://t.me/cvedetector/16134", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20156 - Cisco Meeting Management Unauthenticated Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20156 \nPublished : Jan. 22, 2025, 5:15 p.m. | 36\u00a0minutes ago \nDescription : A vulnerability in the REST API of Cisco Meeting Management could allow a remote, authenticated attacker with low privileges to elevate privileges to administrator on an affected device.  \n  \nThis vulnerability exists because proper authorization is not enforced upon\u00a0REST API users. An attacker could exploit this vulnerability by sending API requests to a specific endpoint. A successful exploit could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T18:54:42.000000Z"}