Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Cisco’s ISE bugs could allow root-level command execution
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Cisco is warning enterprise admins of two critical flaws within its identity and management (IAM) solution, Identity Services Engine (ISE), that could allow attackers to obtain unauthorized privileges and run arbitrary commands on affected systems.Tracked as CVE-2025-20124 and CVE-2025-20125, the flaws have received a critical severity rating of CVSS 9.9 and 9.1 out of 10, respectively.”Multiple vulnerabilities in Cisco ISE could allow an authenticated, remote attacker to execute arbitrary commands and elevate privileges on an affected device,” Cisco said in an advisory.Critical severity ratings have been assigned to the flaws despite the need for the attacker to first obtain admin credentials before they could attempt exploitation. “To exploit these vulnerabilities, the attacker must have valid read-only administrative credentials,” Cisco said. “Any administrative user can be used to exploit these vulnerabilities.” According to the advisory, an API of Cisco ISE is prone to insecure deserialization of user-supplied Java byte streams. A threat actor could exploit this by sending crafted serialized Java object to the affected API.The vulnerability, CVE-2025-20124, “could allow an authenticated remote attacker to execute arbitrary commands as the root user on an affected device.” Successful exploitation of the vulnerability, which requires attackers to have valid read-only credentials, will result in arbitrary code execution and elevated privileges.An API of Cisco ISE, which Cisco didn’t confirm to be the same as the one affected by CVE-2025-20124, could allow attackers with the same admin credentials to obtain sensitive information, change node configurations, and restart the node.”This vulnerability (CVE-2025-20125) is due to a lack of authorization in a specific API and improper validation of user-supplied data,” Cisco added. “An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device.”Roy Akerman, VP of Identity Security Strategy at Silverfort finds this flaw particularly dangerous for its ability to cause identity-based attacks.In a comment to CSO, he said, “The vulnerability allows an attacker to bypass authentication and gain privileged access, enabling lateral movement across the network, which is dangerous. The uniqueness of this flaw lies in its potential to bypass identity-based security controls, making traditional defenses like passwords and basic authentication insufficient.”

A fix is available, irrespective of service contracts

The vulnerabilities impact Cisco ISE and Cisco Passive Identity Connector (ISE-PIC) appliances, regardless of device configuration, the company added. All versions before v3.4, which is not impacted, are supplied a fix.Fixes are available as per affected versions, including 3.1P10 for 3.1, 3.2p7 for 3.2, and 3.3p4 for 3.3. For users running version 3.0 and earlier, Cisco recommended migrating to a fixed release. As the flaws affect all configurations, and no workaround is available for protection, fixing the affected systems is the only way out of exploitation.Cisco said in the advisory that customers with service contracts that entitle regular updates will get the fixes as usual updates, whereas those without one will obtain upgrades by contacting Cisco TAC. There have been no publicly reported cases of these bugs being exploited in the wild.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3819707/ciscos-ise-bugs-could-allow-root-level-command-execution.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link