CVE-2025-20284
16.07.2025, 17:15
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root. This vulnerability is due to insufficient validation of user-supplied input. An attacker with valid credentials could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, the attacker must have valid high-privileged credentials.
Vendor | Product | Version |
---|---|---|
cisco | identity_services_engine | 𝑥 < 3.3.0 |
cisco | identity_services_engine | 3.3.0 |
cisco | identity_services_engine | 3.3.0:patch1 |
cisco | identity_services_engine | 3.3.0:patch2 |
cisco | identity_services_engine | 3.3.0:patch3 |
cisco | identity_services_engine | 3.3.0:patch4 |
cisco | identity_services_engine | 3.3.0:patch5 |
cisco | identity_services_engine | 3.3.0:patch6 |
cisco | identity_services_engine | 3.4.0 |
cisco | identity_services_engine | 3.4.0:patch1 |
cisco | identity_services_engine_passive_identity_connector | 𝑥 < 3.3.0 |
cisco | identity_services_engine_passive_identity_connector | 3.3.0 |
cisco | identity_services_engine_passive_identity_connector | 3.3.0:patch1 |
cisco | identity_services_engine_passive_identity_connector | 3.3.0:patch2 |
cisco | identity_services_engine_passive_identity_connector | 3.3.0:patch3 |
cisco | identity_services_engine_passive_identity_connector | 3.3.0:patch4 |
cisco | identity_services_engine_passive_identity_connector | 3.3.0:patch5 |
cisco | identity_services_engine_passive_identity_connector | 3.3.0:patch6 |
cisco | identity_services_engine_passive_identity_connector | 3.4.0 |
cisco | identity_services_engine_passive_identity_connector | 3.4.0:patch1 |
𝑥
= Vulnerable software versions