Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Start Exploiting Critical Cisco ISE Vulnerabilities

Posted on July 23, 2025July 23, 2025 By CWS

Hackers are focusing on essential vulnerabilities in Cisco Identification Providers Engine (ISE) and ISE Passive Identification Connector (ISE-PIC), lower than a month after patches had been rolled out.

On June 25, Cisco warned that two flaws in ISE and ISE-PIC might permit distant, unauthenticated attackers to execute arbitrary code on the underlying working system, with root privileges.

Final week, Cisco up to date its advisory to warn that, along with the initially found points, tracked as CVE-2025-20281 and CVE-2025-20282 (CVSS rating of 10/10), a 3rd bug, tracked as CVE-2025-20337 and equally extreme, was recognized within the susceptible merchandise.

CVE-2025-20281 and CVE-2025-20337 have an effect on a selected API and exist as a result of user-supplied enter is insufficiently validated. CVE-2025-20282 impacts one other API and exists as a result of inadequate validation checks permit for uploaded recordsdata to be positioned in privileged directories.

Attackers might exploit these points by submitting crafted API requests and by importing crafted recordsdata, permitting them to execute arbitrary instructions and code, with root privileges.

On Tuesday, Cisco up to date its advisory once more, to warn that risk actors have began focusing on these vulnerabilities within the wild.

“In July 2025, the Cisco PSIRT turned conscious of tried exploitation of a few of these vulnerabilities within the wild. Cisco continues to strongly suggest that prospects improve to a hard and fast software program launch to remediate these vulnerabilities,” the corporate notes.

The three flaws have an effect on Cisco ISE and ISE-PIC variations 3.3 and three.4, and had been addressed in ISE and ISE-PIC variations 3.3 Patch 7 and three.4 Patch 2. Variations 3.2 and earlier of the home equipment are usually not affected.Commercial. Scroll to proceed studying.

Cisco recommends that prospects who beforehand put in ISE model 3.3 Patch 6 and the beforehand launched sizzling patches replace to totally patched releases, as they comprise fixes for CVE-2025-20337 as nicely.

All three safety defects had been reported by the Development Micro Zero Day Initiative, Cisco says. The corporate has kept away from sharing particulars on the noticed exploitation makes an attempt.

Associated: Cisco Warns of Hardcoded Credentials in Enterprise Software program

Associated: Excessive-Severity Vulnerabilities Patched by Cisco, Atlassian

Associated: Cisco Patches Vital ISE Vulnerability With Public PoC

Associated: Technical Particulars Printed for Vital Cisco IOS XE Vulnerability

Security Week News Tags:Cisco, Critical, Exploiting, Hackers, ISE, Start, Vulnerabilities

Post navigation

Previous Post: CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild
Next Post: Windows 11 Gets New Black Screen of Death With Auto Recovery Tool

Related Posts

Cisco Routers Hacked for Rootkit Deployment Security Week News
Aanchal Gupta Joins Adobe as Chief Security Officer Security Week News
Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks Security Week News
ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions Security Week News
750,000 Impacted by Data Breach at The Alcohol & Drug Testing Service Security Week News
Vulnerabilities Exposed Phone Number of Any Google User Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers
  • iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot
  • nsKnox Launches Adaptive Payment Security™, Solving the “Impossible Triangle” of B2B Fraud Prevention
  • Ubiquiti UniFi Door Access App Vulnerability Exposes API Management Without Authentication
  • X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers
  • iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot
  • nsKnox Launches Adaptive Payment Security™, Solving the “Impossible Triangle” of B2B Fraud Prevention
  • Ubiquiti UniFi Door Access App Vulnerability Exposes API Management Without Authentication
  • X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News