THREAT ALERT
Wednesday, July 23rd, 2025
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an unauthenticated, remote attacker to issue commands on the underlying operating system as the root user. Cisco has released software updates that address these vulnerabilities. Read the recommendations compiled from Cisco’s security advisory page.
The following was taken directly from Cisco’s security advisory page:
Summary
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an unauthenticated, remote attacker to issue commands on the underlying operating system as the root user.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
Note: Since the publication of version 1.0 of this advisory, improved fixed releases have become available. Cisco recommends upgrading to an enhanced fixed release as follows:
Affected Products
Vulnerable Products
Details
The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.
Details about the vulnerabilities are as follows:
Multiple vulnerabilities in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit these vulnerabilities.
These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
Cisco has released software updates that address these vulnerabilities.
Bug ID(s): CSCwo99449 and CSCwp02814
CVE ID: CVE-2025-20281, CVE-2025-20337
Security Impact Rating (SIR): Critical
CVSS Base Score: 10.0
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device and then execute those files on the underlying operating system as root.
This vulnerability is due to a lack of file validation checks that would prevent uploaded files from being placed in privileged directories on an affected system. An attacker could exploit this vulnerability by uploading a crafted file to the affected device. A successful exploit could allow the attacker to store malicious files on the affected system and then execute arbitrary code or obtain root privileges on the system.
Cisco has released software updates that address this vulnerability.
Bug ID(s): CSCwp02821
CVE ID: CVE-2025-20282
Security Impact Rating (SIR): Critical
CVSS Base Score: 10.0
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Workarounds
There are no workarounds that address these vulnerabilities.
Fixed Releases
Customers are advised to upgrade to an appropriate fixed software release as indicated in the following table.
Note: Since the publication of version 1.0 of this advisory, improved fixed releases have become available. Cisco recommends upgrading to an enhanced fixed release as follows:
Cisco ISE or ISE-PIC Release 3.2 and earlier
First Fixed Release for CVE-2025-20281 Not vulnerable
First Fixed Release for CVE-2025-20282 Not vulnerable
First Fixed Release for CVE-2025-20337 Not vulnerable
Cisco ISE or ISE-PIC Release 3.3
First Fixed Release for CVE-2025-20281 3.3 Patch 7
First Fixed Release for CVE-2025-20282 Not vulnerable
First Fixed Release for CVE-2025-20337 3.3 Patch 7
Cisco ISE or ISE-PIC Release 3.4
First Fixed Release for CVE-2025-20281 3.4 Patch 2
First Fixed Release for CVE-2025-20282 3.4 Patch 2
First Fixed Release for CVE-2025-20337 3.4 Patch 2
For instructions on upgrading a device, see the Upgrade Guides on the Cisco Identity Service Engine support page.
The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.
DefenseStorm Response