CVE-2025-20281
Severity CVSS v4.0:
Pending analysis
Type:
CWE-74
Injection
Publication date:
25/06/2025
Last modified:
26/06/2025
Description
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability.<br />
<br />
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch4:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch5:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.4.0:patch1:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:patch1:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:patch2:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:patch3:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:patch4:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:patch5:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.4.0:-:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page