PT-2025-29858 · Cisco · Cisco Ise-Pic +1
Kentaro Kawane
·
Published
2025-06-25
·
Updated
2025-09-07
·
CVE-2025-20337
CVSS v3.1
10
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Cisco Identity Services Engine (ISE) and Cisco ISE-Passive Identity Connector (ISE-PIC) versions 3.3 and 3.4
**Description:**
A critical vulnerability exists in a specific API of Cisco ISE and Cisco ISE-PIC due to insufficient validation of user-supplied input. This allows an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. Exploitation can be achieved by submitting a crafted API request.
**Recommendations:**
Upgrade to ISE version 3.3 Patch 7 or ISE version 3.4 Patch 2.
Fix
RCE
Special Elements Injection
Weakness Enumeration
Related Identifiers
BDU:2025-08631
CVE-2025-20337
ZDI-25-607
Affected Products
Cisco Ise
Cisco Ise-Pic
References · 106
- https://zerodayinitiative.com/advisories/ZDI-25-607 · Security Note
- https://bdu.fstec.ru/vul/2025-08631 · Security Note
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-20337 · Security Note
- https://twitter.com/UndercodeNews/status/1945938899836047472 · Twitter Post
- https://reddit.com/r/CyberSecurity_NL/comments/1m5lkqc/security_updates_sharepoint_netscaler_en_cisco_ise · Reddit Post
- https://twitter.com/TweetThreatNews/status/1945753527793430653 · Twitter Post
- https://twitter.com/CISACyber/status/1949850419401752607 · Twitter Post
- https://twitter.com/WalkureARCH/status/1946392417919291854 · Twitter Post
- https://twitter.com/Bild96/status/1945803365964771487 · Twitter Post
- https://twitter.com/DarkWebInformer/status/1945943806895132691 · Twitter Post
- https://twitter.com/f1tym1/status/1945823225830617269 · Twitter Post
- https://twitter.com/CVEnew/status/1945562938120528197 · Twitter Post
- https://twitter.com/TheHackersNews/status/1945766422958744020 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1946019269008937258 · Twitter Post