PT-2025-29858 · Cisco · Cisco Ise +1
Kentaro Kawane
·
Published
2025-06-25
·
Updated
2025-07-24
·
CVE-2025-20337
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Cisco Identity Services Engine (ISE) versions 3.3 and 3.4
Cisco ISE-PIC versions 3.3 and 3.4
**Description:**
A critical vulnerability exists in a specific API within Cisco ISE and Cisco ISE-PIC due to insufficient validation of user-supplied input. This allows an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system with root privileges by submitting a crafted API request. No valid credentials are required for exploitation.
**Recommendations:**
Cisco Identity Services Engine version 3.3: Upgrade to Patch 7 or later.
Cisco Identity Services Engine version 3.4: Upgrade to Patch 2 or later.
Cisco ISE-PIC version 3.3: Upgrade to Patch 7 or later.
Cisco ISE-PIC version 3.4: Upgrade to Patch 2 or later.
Fix
RCE
Special Elements Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 83
- https://zerodayinitiative.com/advisories/ZDI-25-607 · Security Note
- https://bdu.fstec.ru/vul/2025-08631 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-20337 · Security Note
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6 · Vendor Advisory
- https://twitter.com/AWNetworks/status/1947338033650450690 · Twitter Post
- https://twitter.com/AndreGironda/status/1947296259561431147 · Twitter Post
- https://twitter.com/f1tym1/status/1945964062791082400 · Twitter Post
- https://twitter.com/_F2po_/status/1945921347412017571 · Twitter Post
- https://twitter.com/stooee_/status/1947680076067160239 · Twitter Post
- https://twitter.com/johndjohnson/status/1946325184153035256 · Twitter Post
- https://twitter.com/riskigy/status/1946678731541561701 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1m3smj9/top_10_trending_cves_19072025 · Reddit Post
- https://twitter.com/threatlight/status/1945725229822509559 · Twitter Post
- https://twitter.com/DarkWebInformer/status/1945943806895132691 · Twitter Post
- https://t.me/c/1129491012/129351 · Telegram Post