CVE-2025-20284

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root.

This vulnerability is due to insufficient validation of user-supplied input. An attacker with valid credentials could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, the attacker must have valid high-privileged credentials.
Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
ciscoCNA
6.5 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 27%
VendorProductVersion
ciscoidentity_services_engine
𝑥
< 3.3.0
ciscoidentity_services_engine
3.3.0
ciscoidentity_services_engine
3.3.0:patch1
ciscoidentity_services_engine
3.3.0:patch2
ciscoidentity_services_engine
3.3.0:patch3
ciscoidentity_services_engine
3.3.0:patch4
ciscoidentity_services_engine
3.3.0:patch5
ciscoidentity_services_engine
3.3.0:patch6
ciscoidentity_services_engine
3.4.0
ciscoidentity_services_engine
3.4.0:patch1
ciscoidentity_services_engine_passive_identity_connector
𝑥
< 3.3.0
ciscoidentity_services_engine_passive_identity_connector
3.3.0
ciscoidentity_services_engine_passive_identity_connector
3.3.0:patch1
ciscoidentity_services_engine_passive_identity_connector
3.3.0:patch2
ciscoidentity_services_engine_passive_identity_connector
3.3.0:patch3
ciscoidentity_services_engine_passive_identity_connector
3.3.0:patch4
ciscoidentity_services_engine_passive_identity_connector
3.3.0:patch5
ciscoidentity_services_engine_passive_identity_connector
3.3.0:patch6
ciscoidentity_services_engine_passive_identity_connector
3.4.0
ciscoidentity_services_engine_passive_identity_connector
3.4.0:patch1
𝑥
= Vulnerable software versions