← Volver a CVEs
CVE-2025-20281
CRITICALCISA KEV10.0
Descripcion
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
Detalles CVE
Puntuacion CVSS v3.110.0
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado6/25/2025
Ultima modificacion10/28/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorCisco
ProductoIdentity Services Engine
Nombre vulnerabilidadCisco Identity Services Engine Injection Vulnerability
Fecha inclusion KEV2025-07-28
Fecha limite remediacion2025-08-18
Uso en ransomwareUnknown
Productos afectados
cisco:identity_services_enginecisco:identity_services_engine_passive_identity_connector
Debilidades (CWE)
CWE-74
Referencias
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6(psirt@cisco.com)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-20281(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.zerodayinitiative.com/blog/2025/7/24/cve-2025-20281-cisco-ise-api-unauthenticated-remote-code-execution-vulnerability(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.