Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Cisco ISE Vulnerabilities Allow Remote Code Execution 

Posted on June 26, 2025June 26, 2025 By CWS

Cisco on Wednesday introduced patches for 2 critical-severity vulnerabilities in Identification Companies Engine (ISE) and Cisco ISE Passive Identification Connector (ISE-PIC) that would result in distant code execution (RCE).

Exploitable with out authentication, the 2 flaws are tracked as CVE-2025-20281 and CVE-2025-20282 and have the utmost severity rating of 10/10. Each impression particular APIs inside the affected merchandise.

CVE-2025-20281 exists as a result of user-supplied enter is insufficiently validated, permitting distant, unauthenticated attackers to submit crafted API requests and execute arbitrary code with root privileges.

CVE-2025-20282 exists as a result of an absence of file validation checks permits attackers to position arbitrary recordsdata in privileged directories on a weak system.

“An attacker might exploit this vulnerability by importing a crafted file to the affected gadget. A profitable exploit might enable the attacker to retailer malicious recordsdata on the affected system after which execute arbitrary code or get hold of root privileges on the system,” Cisco explains in its advisory.

The bugs usually are not depending on each other, and the exploitation of both of them doesn’t require that the opposite is exploited. Moreover, Cisco says, software program variations affected by one flaw will not be impacted by the opposite.

CVE-2025-20281 impacts ISE and ISE-PIC releases 3.3 and later, and was fastened in ISE and ISE-PIC variations 3.3 patch 6 and three.4 patch 2. CVE-2025-20282 solely impacts ISE and ISE-PIC launch 3.4, no matter gadget configuration, and was addressed in ISE and ISE-PIC 3.4 patch 2.

Given the essential severity of each vulnerabilities, customers are suggested to use the obtainable patches as quickly as attainable.Commercial. Scroll to proceed studying.

On Wednesday, Cisco additionally introduced fixes for a medium-severity ISE flaw that would enable distant attackers to bypass authorization mechanisms and modify particular system settings, together with some resulting in a system restart.

Cisco says it’s not conscious of any of those vulnerabilities being exploited within the wild. Further info will be discovered on the corporate’s safety advisories web page.

Associated: Excessive-Severity Vulnerabilities Patched by Cisco, Atlassian

Associated: Cisco Patches Vital ISE Vulnerability With Public PoC

Associated: Technical Particulars Printed for Vital Cisco IOS XE Vulnerability

Security Week News Tags:Cisco, Code, Critical, Execution, ISE, Remote, Vulnerabilities

Post navigation

Previous Post: Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks
Next Post: Central Kentucky Radiology Data Breach Impacts 167,000

Related Posts

Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud Security Week News
Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior Security Week News
SAP Patches Another Critical NetWeaver Vulnerability Security Week News
The ZTNA Blind Spot: Why Unmanaged Devices Threaten Your Hybrid Workforce Security Week News
React Native Aria Packages Backdoored in Supply Chain Attack Security Week News
Security Theater or Real Defense? The KPIs That Tell the Truth Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks
  • Bipartisan Bill Aims to Block Chinese AI From Federal Agencies
  • Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access
  • New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks
  • Man Who Hacked Organizations to Advertise Security Services Pleads Guilty

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks
  • Bipartisan Bill Aims to Block Chinese AI From Federal Agencies
  • Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access
  • New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks
  • Man Who Hacked Organizations to Advertise Security Services Pleads Guilty

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News