Cisco has issued a critical advisory for its Identity Services Engine (ISE) and Passive Identity Connector (ISE-PIC), revealing two unauthenticated remote code execution vulnerabilities that allow attackers to execute commands as root on affected systems.
The vulnerabilities, which hold a maximum CVSS severity rating of 10.0, affect versions 3.3 and above, with no workarounds currently available. Software patches have been released to tackle these critical security holes.
The vulnerabilities, tracked as CVE-2025-20281 and CVE-2025-20282, expose unpatched ISE and ISE-PIC deployments to severe risk by enabling attackers without valid credentials to take full control of targeted systems.
In both cases, successful exploitation grants the attacker the ability to fully compromise an affected device, including running malicious code, stealing sensitive data, or further infiltrating networked assets.
Cisco advisory (ID: cisco-sa-ise-unauth-rce-ZAd2GnJ6) stresses there are no viable workarounds to mitigate these vulnerabilities.
With both vulnerabilities rated critical and allowing exploitation with no user interaction or credentials, the threat to enterprise environments is considered severe.
To protect their networks, organizations must urgently apply the recommended software updates.
The fixed releases for affected versions are as follows:
Organizations using Cisco ISE versions 3.3 or later are strongly advised to patch as soon as possible to avoid potential compromise.
These issues stem from insufficient input validation and lack of file validation in ISE APIs. Exploits could be leveraged by attackers to disrupt operations, exfiltrate data, or install persistent backdoors with root access.
At the time of writing, Cisco’s PSIRT has not observed any public exploitation or reports of attacks in the wild.
The vulnerabilities were responsibly disclosed by researchers Bobby Gould of Trend Micro Zero Day Initiative, and Kentaro Kawane of GMO Cybersecurity by Ierae in collaboration with Trend Micro.
Those lacking support contracts may obtain fixes by contacting Cisco Technical Assistance Center, providing proof of entitlement.
This incident underscores the importance of timely patch management and vigilance around privileged access in network security infrastructure.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…