Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User

Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User

Posted on July 17, 2025July 17, 2025 By CWS

Cisco has disclosed a number of essential safety vulnerabilities in its Identification Providers Engine (ISE) and ISE Passive Identification Connector (ISE-PIC) that might enable unauthenticated distant attackers to execute arbitrary instructions with root privileges on affected techniques.

The vulnerabilities, assigned CVE identifiers CVE-2025-20281, CVE-2025-20282, and CVE-2025-20337, all carry the utmost CVSS rating of 10.0, indicating probably the most extreme degree of threat.

Vulnerability Abstract

CVE IDAffected VersionsPatched VersionsDescriptionCVE-2025-20281ISE/ISE-PIC 3.3, 3.43.3 Patch 7, 3.4 Patch 2API unauthenticated distant code execution through inadequate enter validationCVE-2025-20282ISE/ISE-PIC 3.4 only3.4 Patch 2File add vulnerability permitting arbitrary file execution with root privilegesCVE-2025-20337ISE/ISE-PIC 3.3, 3.43.3 Patch 7, 3.4 Patch 2API unauthenticated distant code execution through inadequate enter validation

The three vulnerabilities stem from inadequate enter validation in particular APIs inside Cisco ISE and ISE-PIC techniques. CVE-2025-20281 and CVE-2025-20337 have an effect on each launch variations 3.3 and three.4, whereas CVE-2025-20282 impacts solely model 3.4.

Crucially, these flaws don’t require any authentication, making them notably harmful as attackers want no legitimate credentials to take advantage of them.

The primary two vulnerabilities enable attackers to execute arbitrary code by submitting crafted API requests attributable to inadequate validation of user-supplied enter.

CVE-2025-20282 presents a unique assault vector, enabling attackers to add arbitrary recordsdata to privileged directories and subsequently execute them with root privileges.

This vulnerability exploits a scarcity of file validation checks that might usually forestall malicious file placement in essential system directories.

Affected Techniques and Scope

The vulnerabilities solely have an effect on Cisco ISE and ISE-PIC releases 3.3 and three.4, no matter machine configuration. Organizations working model 3.2 or earlier are usually not weak to those particular safety flaws.

Provided that ISE serves as a essential community entry management and coverage enforcement platform in lots of enterprise environments, the potential for widespread influence is critical.

The impartial nature of those vulnerabilities implies that exploitation of 1 doesn’t require exploitation of one other, doubtlessly offering a number of assault vectors for malicious actors.

The network-accessible nature of those flaws, mixed with their unauthenticated exploitation functionality, creates an pressing safety state of affairs for affected organizations.

Cisco has launched software program updates to handle all three vulnerabilities, with no out there workarounds. The corporate strongly recommends upgrading to Launch 3.3 Patch 7 for model 3.3 customers or Launch 3.4 Patch 2 for model 3.4 customers.

Organizations presently working Launch 3.4 Patch 2 require no additional motion, whereas these on Launch 3.3 Patch 6 should improve to Patch 7.

Notably, Cisco has deprecated beforehand launched scorching patches (ise-apply-CSCwo99449_3.3.0.430_patch4-SPA.tar.gz and ise-apply-CSCwo99449_3.4.0.608_patch1-SPA.tar.gz) as they failed to handle CVE-2025-20337. Organizations utilizing these scorching patches should improve to the complete patch releases.

The vulnerabilities had been found by accountable disclosure by safety researchers Bobby Gould of Pattern Micro Zero Day Initiative and Kentaro Kawane of GMO Cybersecurity by Ierae.

Cisco’s Product Safety Incident Response Group studies no proof of public exploitation or malicious use of those vulnerabilities on the time of disclosure.

Organizations utilizing affected Cisco ISE techniques ought to prioritize rapid patching because of the essential nature of those vulnerabilities and the potential for full system compromise.

Examine reside malware conduct, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now 

Cyber Security News Tags:Attacker, Cisco, Commands, Critical, Execute, ISE, Remote, Root, User, Vulnerability

Post navigation

Previous Post: Cambodia Makes 1,000 Arrests in Latest Crackdown on Cybercrime
Next Post: Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code

Related Posts

FortiGate Firewall Breaches Exploit Critical Vulnerabilities FortiGate Firewall Breaches Exploit Critical Vulnerabilities Cyber Security News
Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals Cyber Security News
NVIDIA VApp for Windows Vulnerability Let Attackers Execute Malicious Code NVIDIA VApp for Windows Vulnerability Let Attackers Execute Malicious Code Cyber Security News
Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence Cyber Security News
Cloud Security Essentials – Protecting Multi-Cloud Environments Cloud Security Essentials – Protecting Multi-Cloud Environments Cyber Security News
Discord Introduces Age-Restricted Features for Safer Use Discord Introduces Age-Restricted Features for Safer Use Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark