CVE-2025-20130
04.06.2025, 17:15
A vulnerability in the API of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to upload files to an affected device. This vulnerability is due to improper validation of the file copy function. An attacker could exploit this vulnerability by sending a crafted file upload request to a specific API endpoint. A successful exploit could allow the attacker to upload arbitrary files to an affected system.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | identity_services_engine | 𝑥 < 3.1.0 |
cisco | identity_services_engine | 3.1.0 |
cisco | identity_services_engine | 3.1.0:patch1 |
cisco | identity_services_engine | 3.1.0:patch2 |
cisco | identity_services_engine | 3.1.0:patch3 |
cisco | identity_services_engine | 3.1.0:patch4 |
cisco | identity_services_engine | 3.1.0:patch5 |
cisco | identity_services_engine | 3.1.0:patch6 |
cisco | identity_services_engine | 3.1.0:patch7 |
cisco | identity_services_engine | 3.1.0:patch8 |
cisco | identity_services_engine | 3.1.0:patch9 |
cisco | identity_services_engine | 3.2.0 |
cisco | identity_services_engine | 3.2.0:patch1 |
cisco | identity_services_engine | 3.2.0:patch2 |
cisco | identity_services_engine | 3.2.0:patch3 |
cisco | identity_services_engine | 3.2.0:patch4 |
cisco | identity_services_engine | 3.2.0:patch5 |
cisco | identity_services_engine | 3.2.0:patch6 |
cisco | identity_services_engine | 3.3.0 |
cisco | identity_services_engine | 3.3.0:patch1 |
cisco | identity_services_engine | 3.3.0:patch2 |
cisco | identity_services_engine_passive_identity_connector | 𝑥 < 3.1.0 |
cisco | identity_services_engine_passive_identity_connector | 3.1.0 |
cisco | identity_services_engine_passive_identity_connector | 3.1.0:patch1 |
cisco | identity_services_engine_passive_identity_connector | 3.1.0:patch2 |
cisco | identity_services_engine_passive_identity_connector | 3.1.0:patch3 |
cisco | identity_services_engine_passive_identity_connector | 3.1.0:patch4 |
cisco | identity_services_engine_passive_identity_connector | 3.1.0:patch5 |
cisco | identity_services_engine_passive_identity_connector | 3.1.0:patch6 |
cisco | identity_services_engine_passive_identity_connector | 3.1.0:patch7 |
cisco | identity_services_engine_passive_identity_connector | 3.1.0:patch8 |
cisco | identity_services_engine_passive_identity_connector | 3.1.0:patch9 |
cisco | identity_services_engine_passive_identity_connector | 3.2.0 |
cisco | identity_services_engine_passive_identity_connector | 3.2.0:patch1 |
cisco | identity_services_engine_passive_identity_connector | 3.2.0:patch2 |
cisco | identity_services_engine_passive_identity_connector | 3.2.0:patch3 |
cisco | identity_services_engine_passive_identity_connector | 3.2.0:patch4 |
cisco | identity_services_engine_passive_identity_connector | 3.2.0:patch5 |
cisco | identity_services_engine_passive_identity_connector | 3.2.0:patch6 |
cisco | identity_services_engine_passive_identity_connector | 3.3.0 |
cisco | identity_services_engine_passive_identity_connector | 3.3.0:patch1 |
cisco | identity_services_engine_passive_identity_connector | 3.3.0:patch2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-284 - Improper Access ControlThe software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
- CWE-434 - Unrestricted Upload of File with Dangerous TypeThe software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.