CVE-2025-20283
Severity CVSS v4.0:
Pending analysis
Type:
CWE-74
Injection
Publication date:
16/07/2025
Last modified:
22/07/2025
Description
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root.<br />
<br />
This vulnerability is due to insufficient validation of user-supplied input. An attacker with valid credentials could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, the attacker must have valid high-privileged credentials.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:* | 3.3.0 (excluding) | |
cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch4:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch5:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch6:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.4.0:patch1:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:*:*:*:*:*:*:*:* | 3.3.0 (excluding) | |
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:patch1:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:patch2:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:patch3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page