HomeCyber SecurityVital RCE Flaws in Cisco ISE and ISE-PIC Enable Unauthenticated Attackers to...

Vital RCE Flaws in Cisco ISE and ISE-PIC Enable Unauthenticated Attackers to Achieve Root Entry


Jun 26, 2025Ravie LakshmananVulnerability, Community Safety

Vital RCE Flaws in Cisco ISE and ISE-PIC Enable Unauthenticated Attackers to Achieve Root Entry

Cisco has launched updates to handle two maximum-severity safety flaws in Id Companies Engine (ISE) and ISE Passive Id Connector (ISE-PIC) that would allow an unauthenticated attacker to execute arbitrary instructions as the foundation consumer.

The vulnerabilities, assigned the CVE identifiers CVE-2025-20281 and CVE-2025-20282, carry a CVSS rating of 10.0 every. An outline of the defects is beneath –

  • CVE-2025-20281 – An unauthenticated distant code execution vulnerability affecting Cisco ISE and ISE-PIC releases 3.3 and later that would enable an unauthenticated, distant attacker to execute arbitrary code on the underlying working system as root
  • CVE-2025-20282 – An unauthenticated distant code execution vulnerability affecting Cisco ISE and ISE-PIC launch 3.4 that would enable an unauthenticated, distant attacker to add arbitrary information to an affected gadget and execute these information on the underlying working system as root

Cisco mentioned CVE-2025-20281 is the results of inadequate validation of user-supplied enter, which an attacker might exploit by sending a crafted API request to acquire elevated privileges and run instructions.

Cybersecurity

In distinction, CVE-2025-20282 stems from a scarcity of file validation checks that may in any other case forestall the uploaded information from being positioned in privileged directories.

“A profitable exploit might enable the attacker to retailer malicious information on the affected system after which execute arbitrary code or get hold of root privileges on the system,” Cisco mentioned.

The networking gear vendor mentioned there aren’t any workarounds that handle the problems. The shortcomings have been addressed within the beneath variations –

  • CVE-2025-20281 – Cisco ISE or ISE-PIC 3.3 Patch 6 (ise-apply-CSCwo99449_3.3.0.430_patch4-SPA.tar.gz), 3.4 Patch 2 (ise-apply-CSCwo99449_3.4.0.608_patch1-SPA.tar.gz)
  • CVE-2025-20282 – Cisco ISE or ISE-PIC 3.4 Patch 2 (ise-apply-CSCwo99449_3.4.0.608_patch1-SPA.tar.gz)

The corporate credited Bobby Gould of Pattern Micro Zero Day Initiative and Kentaro Kawane of GMO Cybersecurity for reporting CVE-2025-20281. Kawane, who beforehand reported CVE-2025-20286 (CVSS rating: 9.9), has additionally been acknowledged for reporting CVE-2025-20282.

Whereas there is no such thing as a proof that the vulnerabilities have been exploited within the wild, it is important that customers transfer rapidly to use the fixes to safeguard in opposition to potential threats.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments