{"vulnerability": "CVE-2025-20242", "sightings": [{"uuid": "34186e5f-ea8f-4cf5-9292-551fe8c4ba7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20242", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114547277430416464", "content": "", "creation_timestamp": "2025-05-21T18:39:04.371045Z"}, {"uuid": "d57c5dba-285f-4a45-8c34-1740a5011c9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20242", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17137", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20242\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: A vulnerability in the Cloud Connect component of Cisco Unified Contact Center Enterprise (CCE) could allow an unauthenticated, remote attacker to read and modify data on an affected device.\n This vulnerability is due to a lack of proper authentication controls. An attacker could exploit this vulnerability by sending crafted TCP data to a specific port on an affected device. A successful exploit could allow the attacker to read or modify data on the affected device.\n\ud83d\udccf Published: 2025-05-21T16:35:51.813Z\n\ud83d\udccf Modified: 2025-05-21T16:35:51.813Z\n\ud83d\udd17 References:\n1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-contcent-insuffacces-ArDOVhN8", "creation_timestamp": "2025-05-21T16:41:25.000000Z"}]}