PT-2025-26847 · Cisco · Cisco Ise-Pic +1
Bobby Gould
+1
·
Published
2025-06-25
·
Updated
2025-07-24
·
CVE-2025-20281
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Cisco ISE and Cisco ISE-PIC versions 3.3 through 3.4
Cisco ISE and Cisco ISE-PIC (affected versions not specified)
**Description:**
A vulnerability exists in a specific API of Cisco ISE and Cisco ISE-PIC due to insufficient validation of user-supplied input. This allows an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this issue. This vulnerability is actively exploited.
**Recommendations:**
Cisco ISE versions prior to 3.3 Patch 7 are vulnerable.
Cisco ISE-PIC versions prior to 3.4 Patch 2 are vulnerable.
Fix
RCE
Special Elements Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 85
- https://bdu.fstec.ru/vul/2025-08248 · Security Note
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6 · Vendor Advisory
- https://zerodayinitiative.com/advisories/ZDI-25-609 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-20281 · Security Note
- https://twitter.com/illdeed/status/1941152342201729393 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1m3smj9/top_10_trending_cves_19072025 · Reddit Post
- https://twitter.com/CVEnew/status/1937916421545074768 · Twitter Post
- https://twitter.com/fofabot/status/1938431272684294646 · Twitter Post
- https://t.me/c/1385590013/7172 · Telegram Post
- https://t.me/c/1239933375/2597 · Telegram Post
- https://twitter.com/tony3266/status/1947653197516181844 · Twitter Post
- https://twitter.com/dailytechonx/status/1938315073552060815 · Twitter Post
- https://twitter.com/HunterMapping/status/1938428180681080968 · Twitter Post
- https://twitter.com/CCBalert/status/1938613870328717324 · Twitter Post
- https://twitter.com/shojiueda/status/1938067041027772646 · Twitter Post