Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild

Posted on July 22, 2025July 22, 2025 By CWS

Cisco Techniques has issued a essential safety advisory warning of a number of distant code execution vulnerabilities in its Id Companies Engine (ISE) which can be being actively exploited by attackers within the wild.

The vulnerabilities, carrying the utmost CVSS severity rating of 10.0, permit unauthenticated distant attackers to execute arbitrary instructions with root privileges on affected programs.

The networking big disclosed three separate vulnerabilities tracked as CVE-2025-20281, CVE-2025-20282, and CVE-2025-20337, all of which have an effect on Cisco ISE and ISE Passive Id Connector (ISE-PIC) deployments.

The corporate’s Product Safety Incident Response Group (PSIRT) confirmed in July 2025 that a few of these vulnerabilities are being exploited in energetic assaults, prompting pressing requires organizations to use patches instantly.

Cisco ISE RCE Vulnerability Exploited in Wild

Essentially the most extreme vulnerabilities, CVE-2025-20281 and CVE-2025-20337, stem from inadequate validation of user-supplied enter in particular APIs inside ISE variations 3.3 and three.4.

These flaws permit attackers to submit crafted API requests with none authentication, doubtlessly gaining root entry to focused programs. The third vulnerability, CVE-2025-20282, impacts solely ISE model 3.4 and entails an inner API that lacks correct file validation checks.

“An attacker might exploit these vulnerabilities by submitting a crafted API request,” Cisco defined in its advisory. “A profitable exploit might permit the attacker to acquire root privileges on an affected machine.”

The CVE-2025-20282 flaw allows attackers to add arbitrary recordsdata to privileged directories and subsequently execute them with root permissions.

All three vulnerabilities are categorized below Widespread Weak spot Enumeration classes CWE-269 (Improper Privilege Administration) and CWE-74 (Improper Neutralization of Particular Components in Output Utilized by a Downstream Part), highlighting elementary safety design points.

Cisco emphasised that no workarounds exist for these vulnerabilities, making instant patching the one viable protection technique. The corporate has launched enhanced mounted releases following preliminary patches that have been discovered to be incomplete.

Organizations working ISE Launch 3.4 Patch 2 require no additional motion, as this model accommodates all crucial fixes. Nevertheless, programs working ISE Launch 3.3 Patch 6 should improve to Launch 3.3 Patch 7 for full safety.

Cisco ISE or ISE-PIC ReleaseFirst Fastened Launch for CVE-2025-20281First Fastened Launch for CVE-2025-20282First Fastened Launch for CVE-2025-203373.2 and earlierNot vulnerableNot vulnerableNot vulnerable3.33.3 Patch 7Not vulnerable3.3 Patch 73.43.4 Patch 23.4 Patch 23.4 Patch 2

Cisco particularly warned that earlier scorching patches (ise-apply-CSCwo99449_3.3.0.430_patch4-SPA.tar.gz and ise-apply-CSCwo99449_3.4.0.608_patch1-SPA.tar.gz) failed to handle CVE-2025-20337 and have been withdrawn from distribution.

Lively Exploitation

The affirmation of in-the-wild exploitation considerably elevates the urgency of this safety problem.

Cisco ISE serves as a essential community entry management and coverage enforcement platform utilized by organizations worldwide to handle machine authentication and authorization. A profitable compromise might present attackers with intensive community visibility and management capabilities.

Safety researchers Bobby Gould of Development Micro Zero Day Initiative and Kentaro Kawane of GMO Cybersecurity by Ierae have been credited with discovering and reporting these vulnerabilities by accountable disclosure processes.

Cisco continues to observe for exploitation makes an attempt and strongly urges all affected prospects to prioritize these updates.

Organizations ought to confirm their ISE variations instantly and plan emergency upkeep home windows to use the mandatory patches, given the essential nature of those vulnerabilities and confirmed exploitation exercise.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:Cisco, Engine, Exploited, Identity, RCE, Services, Vulnerability, Warns, Wild

Post navigation

Previous Post: Dior Says Personal Information Stolen in Cyberattack
Next Post: Darktrace Acquires Mira Security – SecurityWeek

Related Posts

Russian Hackers Leverage Oracle Cloud Infrastructure to Scaleway Object Storage Cyber Security News
Endpoint Security Reimagined EDR vs XDR Comparison Cyber Security News
Top 3 Evasion Techniques In Phishing Attacks: Real Examples Inside  Cyber Security News
New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP Cyber Security News
Windows 11 Gets New Black Screen of Death With Auto Recovery Tool Cyber Security News
New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News