Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Patches Critical ISE Vulnerability With Public PoC

Posted on June 6, 2025June 6, 2025 By CWS

Cisco this week introduced fixes for a dozen vulnerabilities in its merchandise, together with a critical-severity flaw impacting the cloud deployments of Id Companies Engine (ISE) for which proof-of-concept (PoC) code exists.

The important situation, tracked as CVE-2025-20286 (CVSS rating of 9.9), exists as a result of credentials are improperly generated when deploying ISE on Amazon Net Companies (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI).

As a result of the improperly generated credentials are shared throughout a number of ISE deployments working the identical launch, an attacker might use them to entry ISE situations in several cloud environments.

“A profitable exploit might permit the attacker to entry delicate knowledge, execute restricted administrative operations, modify system configurations, or disrupt companies inside the impacted programs,” Cisco says.

The problem solely impacts ISE situations wherein the Major Administration node is deployed within the cloud, the tech big says.

Cisco warns in its advisory that there are not any workarounds for this vulnerability and that PoC exploit code concentrating on the safety defect exists.

The corporate has launched scorching fixes that apply to ISE releases 3.1 to three.4, noting that ISE variations 3.0 and earlier should not affected.

Of the remaining vulnerabilities, two are high-severity flaws associated to the SSH connectivity of Built-in Administration Controller (IMC) and Nexus Dashboard Cloth Controller (NDFC).Commercial. Scroll to proceed studying.

The primary, tracked as CVE-2025-20261 (CVSS rating of 8.8), impacts the UCS B, C, S, and X sequence servers that settle for incoming SSH connections to the IMC. Home equipment based mostly on pre-configured variations of UCS C-series servers are additionally affected

Inadequate restrictions on entry to inside companies permit a logged-in attacker to entry these companies with elevated privileges and make unauthorized modifications. The attacker might create new administrative accounts on the affected gadgets, Cisco says.

The second high-severity situation, tracked as CVE-2025-20163 (CVSS rating of 8.7), is described as an inadequate SSH host key validation within the SSH implementation of NDFC that enables an attacker to intercept SSH site visitors by performing a machine-in-the-middle assault, and seize person credentials.

All gadgets working NDFC – beforehand referred to as Knowledge Heart Community Supervisor (DCNM) – are affected by the safety defect, no matter their configuration, the tech big warns.

Cisco additionally launched fixes for 9 medium-severity flaws in Unified Communications merchandise, Unified Contact Heart Categorical (Unified CCX), ThousandEyes Endpoint Agent for Home windows, Id Companies Engine (ISE), ISE Passive Id Connector (ISE-PIC), Unified Clever Contact Administration Enterprise, and Buyer Collaboration Platform (CCP).

Profitable exploitation of those vulnerabilities might permit attackers to execute arbitrary instructions as root, carry out an XSS assault, execute arbitrary code, delete arbitrary recordsdata, add recordsdata, or persuade customers to reveal delicate knowledge.

The corporate warned that proof-of-concept (PoC) code was publicly out there for 2 of the medium-severity points (CVE-2025-20130, impacting ISE and ISE-PIC; and CVE-2025-20129, affecting CCP, previously SocialMiner), however stated it was not conscious of any of the safety defects being exploited in assaults.

Customers are suggested to replace their Cisco home equipment as quickly as potential. Extra data on these vulnerabilities could be discovered on Cisco’s safety advisories web page.

Associated: Technical Particulars Printed for Vital Cisco IOS XE Vulnerability

Associated: Splunk Patches Dozens of Vulnerabilities

Associated: Zoom Patches 4 Excessive-Severity Vulnerabilities

Associated: Zyxel Points ‘No Patch’ Warning for Exploited Zero-Days

Security Week News Tags:Cisco, Critical, ISE, Patches, PoC, Public, Vulnerability

Post navigation

Previous Post: BADBOX 2.0 Infected Over 1 Million Android Devices Worldwide
Next Post: Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure

Related Posts

CrowdStrike Plans Layoffs to Pursue $10B ARR Target Security Week News
Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next Security Week News
Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025 Security Week News
Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities Security Week News
Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits Security Week News
Lee Enterprises Says 40,000 Hit by Ransomware-Caused Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News