Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User

Posted on July 17, 2025July 17, 2025 By CWS

Cisco has disclosed a number of essential safety vulnerabilities in its Identification Providers Engine (ISE) and ISE Passive Identification Connector (ISE-PIC) that might enable unauthenticated distant attackers to execute arbitrary instructions with root privileges on affected techniques.

The vulnerabilities, assigned CVE identifiers CVE-2025-20281, CVE-2025-20282, and CVE-2025-20337, all carry the utmost CVSS rating of 10.0, indicating probably the most extreme degree of threat.

Vulnerability Abstract

CVE IDAffected VersionsPatched VersionsDescriptionCVE-2025-20281ISE/ISE-PIC 3.3, 3.43.3 Patch 7, 3.4 Patch 2API unauthenticated distant code execution through inadequate enter validationCVE-2025-20282ISE/ISE-PIC 3.4 only3.4 Patch 2File add vulnerability permitting arbitrary file execution with root privilegesCVE-2025-20337ISE/ISE-PIC 3.3, 3.43.3 Patch 7, 3.4 Patch 2API unauthenticated distant code execution through inadequate enter validation

The three vulnerabilities stem from inadequate enter validation in particular APIs inside Cisco ISE and ISE-PIC techniques. CVE-2025-20281 and CVE-2025-20337 have an effect on each launch variations 3.3 and three.4, whereas CVE-2025-20282 impacts solely model 3.4.

Crucially, these flaws don’t require any authentication, making them notably harmful as attackers want no legitimate credentials to take advantage of them.

The primary two vulnerabilities enable attackers to execute arbitrary code by submitting crafted API requests attributable to inadequate validation of user-supplied enter.

CVE-2025-20282 presents a unique assault vector, enabling attackers to add arbitrary recordsdata to privileged directories and subsequently execute them with root privileges.

This vulnerability exploits a scarcity of file validation checks that might usually forestall malicious file placement in essential system directories.

Affected Techniques and Scope

The vulnerabilities solely have an effect on Cisco ISE and ISE-PIC releases 3.3 and three.4, no matter machine configuration. Organizations working model 3.2 or earlier are usually not weak to those particular safety flaws.

Provided that ISE serves as a essential community entry management and coverage enforcement platform in lots of enterprise environments, the potential for widespread influence is critical.

The impartial nature of those vulnerabilities implies that exploitation of 1 doesn’t require exploitation of one other, doubtlessly offering a number of assault vectors for malicious actors.

The network-accessible nature of those flaws, mixed with their unauthenticated exploitation functionality, creates an pressing safety state of affairs for affected organizations.

Cisco has launched software program updates to handle all three vulnerabilities, with no out there workarounds. The corporate strongly recommends upgrading to Launch 3.3 Patch 7 for model 3.3 customers or Launch 3.4 Patch 2 for model 3.4 customers.

Organizations presently working Launch 3.4 Patch 2 require no additional motion, whereas these on Launch 3.3 Patch 6 should improve to Patch 7.

Notably, Cisco has deprecated beforehand launched scorching patches (ise-apply-CSCwo99449_3.3.0.430_patch4-SPA.tar.gz and ise-apply-CSCwo99449_3.4.0.608_patch1-SPA.tar.gz) as they failed to handle CVE-2025-20337. Organizations utilizing these scorching patches should improve to the complete patch releases.

The vulnerabilities had been found by accountable disclosure by safety researchers Bobby Gould of Pattern Micro Zero Day Initiative and Kentaro Kawane of GMO Cybersecurity by Ierae.

Cisco’s Product Safety Incident Response Group studies no proof of public exploitation or malicious use of those vulnerabilities on the time of disclosure.

Organizations utilizing affected Cisco ISE techniques ought to prioritize rapid patching because of the essential nature of those vulnerabilities and the potential for full system compromise.

Examine reside malware conduct, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now 

Cyber Security News Tags:Attacker, Cisco, Commands, Critical, Execute, ISE, Remote, Root, User, Vulnerability

Post navigation

Previous Post: How to Prevent Brute Force Attacks
Next Post: Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code

Related Posts

Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads Cyber Security News
An Open-Source Tool to See Through Encrypted Traffic in Linux systems Cyber Security News
Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
Pure Crypter Employs Multiple Evasion Techniques To Bypass Windows 11 24H2 Security Features Cyber Security News
Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload Cyber Security News
Zoom Clients for Windows Vulnerability Exposes Users to DoS Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Armenian Man Extradited to US Over Ryuk Ransomware Attacks
  • GhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability
  • Mobile Forensics Tool Used by Chinese Law Enforcement Dissected
  • Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine
  • What Security Leaders Need to Know in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Armenian Man Extradited to US Over Ryuk Ransomware Attacks
  • GhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability
  • Mobile Forensics Tool Used by Chinese Law Enforcement Dissected
  • Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine
  • What Security Leaders Need to Know in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News