Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities

Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities

Posted on May 22, 2025May 22, 2025 By CWS

Cisco on Wednesday printed 10 safety advisories detailing over a dozen vulnerabilities throughout its merchandise, together with two high-severity flaws in its Id Companies Engine (ISE) and Unified Intelligence Heart.

The ISE bug, tracked as CVE-2025-20152, impacts the RADIUS message processing characteristic and could possibly be exploited remotely, with out authentication, to trigger ISE to reload, resulting in a denial of service (DoS) situation.

“This vulnerability is because of improper dealing with of sure RADIUS requests. An attacker might exploit this vulnerability by sending a particular authentication request to a community entry system (NAD) that makes use of Cisco ISE for authentication, authorization, and accounting (AAA),” Cisco notes in its advisory.

The networking big additionally resolved a high-severity concern in Unified Intelligence Heart, tracked as CVE-2025-20113, that would permit an authenticated attacker to raise their privileges to these of an administrator, for a restricted set of capabilities on a weak system.

“This vulnerability is because of inadequate server-side validation of user-supplied parameters in API or HTTP requests. An attacker might exploit this vulnerability by submitting a crafted API or HTTP request to an affected system,” Cisco explains.

The safety defect was resolved alongside CVE-2025-20114, a medium-severity vulnerability that may be exploited for horizontal privilege escalation.

“This vulnerability is because of inadequate validation of user-supplied parameters in API requests. An attacker might exploit this vulnerability by submitting crafted API requests to an affected system to execute an insecure direct object reference assault,” the advisory notes.

Medium-severity bugs had been additionally resolved in Webex, Webex Conferences, Safe Community Analytics Supervisor, Safe Community Analytics Digital Supervisor, ISE, Duo, Unified Communications and Contact Heart Options, and Unified Contact Heart Enterprise (CCE).Commercial. Scroll to proceed studying.

Profitable exploitation of the safety flaws might result in XSS assaults, manipulated cached HTTP responses, arbitrary command execution, fraudulent findings in analytics reviews, arbitrary command injection, privilege escalation, and knowledge tampering.

Cisco says it isn’t conscious of any of those vulnerabilities being exploited within the wild. Further data may be discovered on Cisco’s safety advisories web page.

Associated: Cisco Patches 35 Vulnerabilities Throughout A number of Merchandise

Associated: Cisco Confirms Some Merchandise Impacted by Vital Erlang/OTP Flaw

Associated: Vulnerabilities Patched in Atlassian, Cisco Merchandise

Associated:Vulnerabilities Expose Cisco Meraki and ECE Merchandise to DoS Assaults

Security Week News Tags:Cisco, DoS, Escalation, HighSeverity, Patches, Privilege, Vulnerabilities

Post navigation

Previous Post: FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections
Next Post: Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough

Related Posts

ArmorCode Secures M to Enhance AI Exposure Management ArmorCode Secures $16M to Enhance AI Exposure Management Security Week News
Neon Cyber Emerges from Stealth, Shining a Light into the Browser Neon Cyber Emerges from Stealth, Shining a Light into the Browser Security Week News
Gardyn Smart Gardens: Vulnerabilities and Security Patches Gardyn Smart Gardens: Vulnerabilities and Security Patches Security Week News
Extortion Group Leaks Millions of Records From Salesforce Hacks Extortion Group Leaks Millions of Records From Salesforce Hacks Security Week News
Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices Security Week News
Shai-Hulud Supply Chain Attack Led to .5 Million Trust Wallet Heist Shai-Hulud Supply Chain Attack Led to $8.5 Million Trust Wallet Heist Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark