Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Patches Another Critical ISE Vulnerability

Cisco Patches Another Critical ISE Vulnerability

Posted on July 17, 2025July 17, 2025 By CWS

Cisco on Wednesday knowledgeable clients of one other critical-severity vulnerability in Id Providers Engine (ISE) and ISE Passive Id Connector (ISE-PIC) that might result in distant code execution (RCE).

In an replace to a June 25 advisory detailing two such flaws, tracked as CVE-2025-20281 and CVE-2025-20282, the tech big added a contemporary CVE to the listing, alerting customers of its most severity score.

Tracked as CVE-2025-20337, the bug has a CVSS rating of 10/10, the identical as the opposite two points, and impacts the identical API as CVE-2025-20281.

“A number of vulnerabilities in a selected API of Cisco ISE and Cisco ISE-PIC might enable an unauthenticated, distant attacker to execute arbitrary code on the underlying working system as root. The attacker doesn’t require any legitimate credentials to use these vulnerabilities,” Cisco notes in its advisory.

The inadequate validation of user-supplied enter, the corporate explains, might enable an attacker to submit a crafted API request and acquire root privileges on an affected system.

The safety defects affect Cisco ISE and ISE-PIC variations 3.3 and three.4, and have been addressed in variations 3.3 patch 7 and three.4 patch 2.

On Tuesday, Cisco additionally introduced fixes for CVE-2025-20274 (CVSS rating of 6.3), a high-severity vulnerability within the web-based administration interface of Unified Intelligence Middle that might be exploited for arbitrary file uploads.

Improper validation of information uploaded to the interface permits authenticated, distant attackers to retailer malicious information on the system, resulting in the execution of arbitrary instructions. The flaw might be exploited to raise privileges to root, which will increase its severity, Cisco says.Commercial. Scroll to proceed studying.

Patches for the difficulty have been included in Unified Intelligence Middle variations 12.5(1) SU ES05 and 12.6(2) ES05. Cisco recommends that customers of Unified CCX variations 12.5(1) SU3 and earlier migrate to model 15, which isn’t affected.

The tech big additionally introduced patches for medium-severity safety defects in ISE and ISE-PIC, Advanced Programmable Community Supervisor (EPNM), Prime Infrastructure, and Unified Intelligence Middle.

Cisco says it’s not conscious of any of those vulnerabilities being exploited within the wild. Extra data will be discovered on the corporate’s safety advisories web page.

Associated: Cisco Warns of Hardcoded Credentials in Enterprise Software program

Associated: Excessive-Severity Vulnerabilities Patched by Cisco, Atlassian

Associated: Cisco Patches Crucial ISE Vulnerability With Public PoC

Associated: Technical Particulars Revealed for Crucial Cisco IOS XE Vulnerability

Security Week News Tags:Cisco, Critical, ISE, Patches, Vulnerability

Post navigation

Previous Post: Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors
Next Post: Threat Actors Weaponizing SVG Files to Embed Malicious JavaScript

Related Posts

Cloudflare Puts a Default Block on AI Web Scraping Cloudflare Puts a Default Block on AI Web Scraping Security Week News
Chinese Hackers Hit Drone Sector in Supply Chain Attacks Chinese Hackers Hit Drone Sector in Supply Chain Attacks Security Week News
Mississippi Clinics Close Amid Ransomware Disruption Mississippi Clinics Close Amid Ransomware Disruption Security Week News
Enhancing Vulnerability Management in the AI-Driven Era Enhancing Vulnerability Management in the AI-Driven Era Security Week News
Cyber Insights 2026: Zero Trust and Following the Path Cyber Insights 2026: Zero Trust and Following the Path Security Week News
2 Venezuelans Convicted in US for Using Malware to Hack ATMs 2 Venezuelans Convicted in US for Using Malware to Hack ATMs Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark