Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI

Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI

Posted on June 5, 2025June 5, 2025 By CWS

Jun 05, 2025Ravie LakshmananNetwork Safety / Vulnerability
Cisco has launched safety patches to handle a essential safety flaw impacting the Id Providers Engine (ISE) that, if efficiently exploited, may permit unauthenticated actors to hold out malicious actions on inclined techniques.
The safety defect, tracked as CVE-2025-20286, carries a CVSS rating of 9.9 out of 10.0. It has been described as a static credential vulnerability.
“A vulnerability in Amazon Net Providers (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Id Providers Engine (ISE) may permit an unauthenticated, distant attacker to entry delicate information, execute restricted administrative operations, modify system configurations, or disrupt providers inside the impacted techniques,” the corporate stated in an advisory.
The networking tools maker, which credited Kentaro Kawane of GMO Cybersecurity for reporting the flaw, famous it is conscious of the existence of a proof-of-concept (PoC) exploit. There isn’t a proof that it has been maliciously exploited within the wild.

Cisco stated the problem stems from the truth that credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, inflicting totally different deployments to share the identical credentials so long as the software program launch and cloud platform are the identical.
Put otherwise, the static credentials are particular to every launch and platform, however aren’t legitimate throughout platforms. As the corporate highlights, all situations of Cisco ISE launch 3.1 on AWS may have the identical static credentials.
Nonetheless, credentials which are legitimate for entry to a launch 3.1 deployment wouldn’t be legitimate to entry a launch 3.2 deployment on the identical platform. Moreover, Launch 3.2 on AWS wouldn’t have the identical credentials as Launch 3.2 on Azure.
Profitable exploitation of the vulnerability may allow an attacker to extract the person credentials from the Cisco ISE cloud deployment after which use it to entry Cisco ISE deployed in different cloud environments by unsecured ports.
This might in the end permit unauthorized entry to delicate information, execution of restricted administrative operations, modifications to system configurations, or service disruptions. That stated, Cisco ISE is simply affected in instances the place the Main Administration node is deployed within the cloud. Main Administration nodes which are on-premises aren’t impacted.

The next variations are affected –

AWS – Cisco ISE 3.1, 3.2, 3.3, and three.4
Azure – Cisco ISE 3.2, 3.3, and three.4
OCI – Cisco ISE 3.2, 3.3, and three.4

Whereas there aren’t any workarounds to handle CVE-2025-20286, Cisco is recommending that customers prohibit visitors to licensed directors or run the “utility reset-config ise” command to reset person passwords to a brand new worth. Nonetheless, it bears noting that working the command will reset Cisco ISE to the manufacturing facility configuration.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Auth, AWS, Azure, Bypass, Cisco, Cloud, Critical, Deployments, Flaw, Impacts, ISE, OCI

Post navigation

Previous Post: How to Audit Your Personal Online Presence
Next Post: Vodafone Germany Fined $51 Million Over Privacy, Security Failures

Related Posts

Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More The Hacker News
Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector The Hacker News
ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach The Hacker News
Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation The Hacker News
A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do The Hacker News
A Browser Extension Risk Guide After the ShadyPanda Campaign A Browser Extension Risk Guide After the ShadyPanda Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News