PT-2025-29858 · Cisco · Cisco Ise +1
Kentaro Kawane
·
Published
2025-06-25
·
Updated
2025-11-25
·
CVE-2025-20337
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco Identity Services Engine and Cisco ISE-PIC versions 3.3 and 3.4
Cisco Identity Services Engine versions prior to 3.3 Patch 7
Cisco ISE-PIC versions prior to 3.4 Patch 2
Description
A critical vulnerability exists in a specific API of Cisco Identity Services Engine (ISE) and Cisco ISE-PIC. This flaw allows an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system with root privileges. The vulnerability is due to insufficient validation of user-supplied input, enabling exploitation through crafted API requests. The vulnerability is actively exploited. It is estimated that over 1,000 services are vulnerable. The exploitation of this vulnerability, along with CitrixBleed 2, was observed in a coordinated attack by a sophisticated threat actor. The attacker utilized custom malware and backdoors to gain administrative access to compromised systems. The malware used for ISE was designed to run in memory and registered as an HTTP handler.
API Endpoints: The vulnerability is triggered through a crafted API request.
Vulnerable Parameters or Variables: User-supplied input is not properly validated.
Recommendations
Cisco Identity Services Engine versions prior to 3.3 Patch 7: Upgrade to version 3.3 Patch 7 or later.
Cisco ISE-PIC versions prior to 3.4 Patch 2: Upgrade to version 3.4 Patch 2 or later.
Fix
RCE
Special Elements Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-08631
CVE-2025-20337
ZDI-25-607
Affected Products
Cisco Ise
Cisco Ise-Pic
References · 140
- https://zerodayinitiative.com/advisories/ZDI-25-607 · Security Note
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-20337 · Security Note
- https://bdu.fstec.ru/vul/2025-08631 · Security Note
- https://twitter.com/CybrPulse/status/1945878013767200924 · Twitter Post
- https://twitter.com/trubetech/status/1945875626679767066 · Twitter Post
- https://twitter.com/NITDANigeria/status/1957851214084805106 · Twitter Post
- https://twitter.com/CybrPulse/status/1945828397118079010 · Twitter Post
- https://twitter.com/Alevskey/status/1945806960026120676 · Twitter Post
- https://twitter.com/VulmonFeeds/status/1945556028533219526 · Twitter Post
- https://twitter.com/CISACyber/status/1949850419401752607 · Twitter Post
- https://t.me/pentestingnews/70886 · Telegram Post
- https://twitter.com/john_video/status/1989355221999292791 · Twitter Post
- https://t.me/CSIRT_italia/2597 · Telegram Post
- https://twitter.com/compuchris/status/1948427489279193314 · Twitter Post