Article Details
Scrape Timestamp (UTC): 2025-06-26 13:32:44.197
Source: https://thehackernews.com/2025/06/critical-rce-flaws-in-cisco-ise-and-ise.html
Original Article Text
Click to Toggle View
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access. Cisco has released updates to address two maximum-severity security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could permit an unauthenticated attacker to execute arbitrary commands as the root user. The vulnerabilities, assigned the CVE identifiers CVE-2025-20281 and CVE-2025-20282, carry a CVSS score of 10.0 each. A description of the defects is below - Cisco said CVE-2025-20281 is the result of insufficient validation of user-supplied input, which an attacker could exploit by sending a crafted API request to obtain elevated privileges and run commands. In contrast, CVE-2025-20282 stems from a lack of file validation checks that would otherwise prevent the uploaded files from being placed in privileged directories. "A successful exploit could allow the attacker to store malicious files on the affected system and then execute arbitrary code or obtain root privileges on the system," Cisco said. The networking equipment vendor said there are no workarounds that address the issues. The shortcomings have been addressed in the below versions - The company credited Bobby Gould of Trend Micro Zero Day Initiative and Kentaro Kawane of GMO Cybersecurity for reporting CVE-2025-20281. Kawane, who previously reported CVE-2025-20286 (CVSS score: 9.9), has also been acknowledged for reporting CVE-2025-20282. While there is no evidence that the vulnerabilities have been exploited in the wild, it's essential that users move quickly to apply the fixes to safeguard against potential threats.
Daily Brief Summary
Cisco has patched two significant security vulnerabilities in their Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC), both rated with a CVSS score of 10.0.
The vulnerabilities, identified as CVE-2025-20281 and CVE-2025-20282, could allow unauthorized attackers to execute commands as the root user.
CVE-2025-20281 involves insufficient validation of user-supplied input via crafted API requests that could lead to elevated privileges.
CVE-2025-20282 is triggered by inadequate file validation checks, allowing malicious files to be placed and executed in privileged directories.
These critical flaws enable unauthenticated attackers to potentially gain root access and execute arbitrary commands on the affected systems.
No workarounds are available, making it crucial for users to apply the provided updates promptly to mitigate risks.
Security researchers Bobby Gould and Kentaro Kawane are credited with the discovery and reporting of these vulnerabilities.
There have been no reported exploitations in the wild; however, quick remediation is advised to prevent potential security breaches.