Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Patches Another Critical ISE Vulnerability

Posted on July 17, 2025July 17, 2025 By CWS

Cisco on Wednesday knowledgeable clients of one other critical-severity vulnerability in Id Providers Engine (ISE) and ISE Passive Id Connector (ISE-PIC) that might result in distant code execution (RCE).

In an replace to a June 25 advisory detailing two such flaws, tracked as CVE-2025-20281 and CVE-2025-20282, the tech big added a contemporary CVE to the listing, alerting customers of its most severity score.

Tracked as CVE-2025-20337, the bug has a CVSS rating of 10/10, the identical as the opposite two points, and impacts the identical API as CVE-2025-20281.

“A number of vulnerabilities in a selected API of Cisco ISE and Cisco ISE-PIC might enable an unauthenticated, distant attacker to execute arbitrary code on the underlying working system as root. The attacker doesn’t require any legitimate credentials to use these vulnerabilities,” Cisco notes in its advisory.

The inadequate validation of user-supplied enter, the corporate explains, might enable an attacker to submit a crafted API request and acquire root privileges on an affected system.

The safety defects affect Cisco ISE and ISE-PIC variations 3.3 and three.4, and have been addressed in variations 3.3 patch 7 and three.4 patch 2.

On Tuesday, Cisco additionally introduced fixes for CVE-2025-20274 (CVSS rating of 6.3), a high-severity vulnerability within the web-based administration interface of Unified Intelligence Middle that might be exploited for arbitrary file uploads.

Improper validation of information uploaded to the interface permits authenticated, distant attackers to retailer malicious information on the system, resulting in the execution of arbitrary instructions. The flaw might be exploited to raise privileges to root, which will increase its severity, Cisco says.Commercial. Scroll to proceed studying.

Patches for the difficulty have been included in Unified Intelligence Middle variations 12.5(1) SU ES05 and 12.6(2) ES05. Cisco recommends that customers of Unified CCX variations 12.5(1) SU3 and earlier migrate to model 15, which isn’t affected.

The tech big additionally introduced patches for medium-severity safety defects in ISE and ISE-PIC, Advanced Programmable Community Supervisor (EPNM), Prime Infrastructure, and Unified Intelligence Middle.

Cisco says it’s not conscious of any of those vulnerabilities being exploited within the wild. Extra data will be discovered on the corporate’s safety advisories web page.

Associated: Cisco Warns of Hardcoded Credentials in Enterprise Software program

Associated: Excessive-Severity Vulnerabilities Patched by Cisco, Atlassian

Associated: Cisco Patches Crucial ISE Vulnerability With Public PoC

Associated: Technical Particulars Revealed for Crucial Cisco IOS XE Vulnerability

Security Week News Tags:Cisco, Critical, ISE, Patches, Vulnerability

Post navigation

Previous Post: Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors
Next Post: Threat Actors Weaponizing SVG Files to Embed Malicious JavaScript

Related Posts

Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison Security Week News
Chinese Cyberspies Hacked US Defense Contractors Security Week News
Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack Security Week News
Vulnerabilities in CISA KEV Are Not Equally Critical: Report Security Week News
Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited Security Week News
DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark