Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Start Exploiting Critical Cisco ISE Vulnerabilities

Posted on July 23, 2025July 23, 2025 By CWS

Hackers are focusing on essential vulnerabilities in Cisco Identification Providers Engine (ISE) and ISE Passive Identification Connector (ISE-PIC), lower than a month after patches had been rolled out.

On June 25, Cisco warned that two flaws in ISE and ISE-PIC might permit distant, unauthenticated attackers to execute arbitrary code on the underlying working system, with root privileges.

Final week, Cisco up to date its advisory to warn that, along with the initially found points, tracked as CVE-2025-20281 and CVE-2025-20282 (CVSS rating of 10/10), a 3rd bug, tracked as CVE-2025-20337 and equally extreme, was recognized within the susceptible merchandise.

CVE-2025-20281 and CVE-2025-20337 have an effect on a selected API and exist as a result of user-supplied enter is insufficiently validated. CVE-2025-20282 impacts one other API and exists as a result of inadequate validation checks permit for uploaded recordsdata to be positioned in privileged directories.

Attackers might exploit these points by submitting crafted API requests and by importing crafted recordsdata, permitting them to execute arbitrary instructions and code, with root privileges.

On Tuesday, Cisco up to date its advisory once more, to warn that risk actors have began focusing on these vulnerabilities within the wild.

“In July 2025, the Cisco PSIRT turned conscious of tried exploitation of a few of these vulnerabilities within the wild. Cisco continues to strongly suggest that prospects improve to a hard and fast software program launch to remediate these vulnerabilities,” the corporate notes.

The three flaws have an effect on Cisco ISE and ISE-PIC variations 3.3 and three.4, and had been addressed in ISE and ISE-PIC variations 3.3 Patch 7 and three.4 Patch 2. Variations 3.2 and earlier of the home equipment are usually not affected.Commercial. Scroll to proceed studying.

Cisco recommends that prospects who beforehand put in ISE model 3.3 Patch 6 and the beforehand launched sizzling patches replace to totally patched releases, as they comprise fixes for CVE-2025-20337 as nicely.

All three safety defects had been reported by the Development Micro Zero Day Initiative, Cisco says. The corporate has kept away from sharing particulars on the noticed exploitation makes an attempt.

Associated: Cisco Warns of Hardcoded Credentials in Enterprise Software program

Associated: Excessive-Severity Vulnerabilities Patched by Cisco, Atlassian

Associated: Cisco Patches Vital ISE Vulnerability With Public PoC

Associated: Technical Particulars Printed for Vital Cisco IOS XE Vulnerability

Security Week News Tags:Cisco, Critical, Exploiting, Hackers, ISE, Start, Vulnerabilities

Post navigation

Previous Post: CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild
Next Post: Windows 11 Gets New Black Screen of Death With Auto Recovery Tool

Related Posts

Vulnerability Exposed All Open VSX Repositories to Takeover Security Week News
Fog Ransomware Attack Employs Unusual Tools Security Week News
Chinese Hackers Hit Drone Sector in Supply Chain Attacks Security Week News
Guardz Banks $56M Series B for All-in-One SMB Security Security Week News
Code Execution Vulnerability Patched in GitHub Enterprise Server Security Week News
OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News