Loading HuntDB...

CVE-2025-20281

CRITICAL
Published 2025-06-25T16:11:42.285Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-20281. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
10.0
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.

Available Exploits

No exploits available for this CVE.

Related News

Exploit available for critical Cisco ISE bug exploited in attacks

Security researcher Bobby Gould has published a blog post demonstrating a complete exploit chain for CVE-2025-20281, an unauthenticated remote code execution vulnerability in Cisco Identity Services Engine (ISE). [...]

BleepingComputer 2025-07-28 17:29
CISA Adds Three Known Exploited Vulnerabilities to Catalog

CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-20281 Cisco Identity Services Engine Injection Vulnerability CVE-2025-20337 Cisco Identity Serv…

Cisa.gov 2025-07-28 12:00
Cisco confirms active exploitation of ISE and ISE-PIC flaws

Cisco warns of active exploits targeting Identity Services Engine (ISE) and ISE-PIC flaws, first observed in July 2025. Cisco confirmed attempted exploitation in the wild of recently disclosed ISE and ISE-PIC flaws (CVE-2025-20281, CVE-2025-20282, CVE-2025-20…

Securityaffairs.com 2025-07-22 19:52
Cisco fixed critical ISE flaws allowing Root-level remote code execution

Cisco released patches to address two critical vulnerabilities in ISE and ISE-PIC that could let remote attackers execute to code as root. Cisco addressed two critical vulnerabilities, tracked as CVE-2025-20281 and CVE-2025-20282, in Identity Services Engine …

Securityaffairs.com 2025-06-26 12:25

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

August 18, 2025

Added to KEV

July 28, 2025

Required Action

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Product

Vendor/Project: Cisco
Product: Identity Services Engine

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.07.28 Released: July 28, 2025

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.

Affected Products (ENISA)

cisco
cisco identity services engine software

ENISA Scoring

CVSS Score (3.1)

10.0
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS Score

1.490
probability

Data provided by ENISA EU Vulnerability Database. Last updated: July 30, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed CRITICAL

GHSA-rc4f-42xm-hvjw

Advisory Details

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: June 26, 2025, Modified: July 30, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

21 posts
Reddit 2 weeks, 3 days ago
technadu

Gayfemboy Botnet resurfaces with advanced evasion & global router attacks Citizen researchers + Fortinet have observed the return of the **Mirai-based Gayfemboy botnet**, targeting IoT routers and enterprise devices worldwide. 🌍 **Infected regions**: U.S., Brazil, Mexico, Israel, Germany, Switzerland, Vietnam. 🔑 **Highlights**: * Exploits flaws in DrayTek Vigor, TP-Link Archer …

Reddit 4 weeks ago
MauriceTorres
Exploit PoC

August Patch Tuesday updates 𝗧𝗼𝗱𝗮𝘆'𝘀 𝗣𝗮𝘁𝗰𝗵 𝗧𝘂𝗲𝘀𝗱𝗮𝘆 𝗼𝘃𝗲𝗿𝘃𝗶𝗲𝘄: ▪️ Microsoft has addressed 107 vulnerabilities, one zero-day with PoC (CVE-2025-53779), 13 critical ▪️ Third-party: actively exploited vulnerabilities in Google Chrome, Android, Apple, Cisco ISE, and Wing FTP Server, plus major third-party issues affecting Axis Communications, Dell ControlVault3, Nvidia, WordPress, and Sophos …

5
1
7.0
View Original High Risk
Reddit 1 month, 1 week ago
k12techpro

Security Watch 8/1/25 On K12TechPro, we've launched a weekly cyber threat intelligence and vulnerability newsletter with NTP and K12TechPro. We'll post the "public" news to k12sysadmin from each newsletter. For the full "k12 techs only" portion (no middle schoolers, bad guys, vendors, etc. allowed), log into [k12techpro.com](http://k12techpro.com) and visit the …

Also mentions: CVE-2025-20337
Reddit 1 month, 1 week ago
crstux
Exploit

🔥 Top 10 Trending CVEs (30/07/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2023-2533](https://nvd.nist.gov/vuln/detail/CVE-2023-2533)** - 📝 A Cross-Site Request Forgery (CSRF) vulnerability has been identified in PaperCut NG/MF, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary …

2
2.0
View Original High Risk
Reddit 1 month, 1 week ago
crstux
Exploit

🔥 Top 10 Trending CVEs (29/07/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-31199](https://nvd.nist.gov/vuln/detail/CVE-2025-31199)** - 📝 A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.4 and iPadOS 18.4, visionOS 2.4, macOS Sequoia 15.4. An app may be …

1
1.0
View Original High Risk
Reddit 1 month, 1 week ago
crstux
Exploit

🔥 Top 10 Trending CVEs (28/07/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-22230](https://nvd.nist.gov/vuln/detail/CVE-2025-22230)** - 📝 VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control.A malicious actor with non-administrative privileges on a guest VM may gain ability to perform …

1
1.0
View Original High Risk
Reddit 1 month, 1 week ago
crstux
Exploit

🔥 Top 10 Trending CVEs (27/07/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-23266](https://nvd.nist.gov/vuln/detail/CVE-2025-23266)** - 📝 NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to initialize the container, where an attacker could execute arbitrary code with elevated permissions. A …

1
1.0
View Original High Risk
Reddit 1 month, 2 weeks ago
crstux
Exploit

🔥 Top 10 Trending CVEs (26/07/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-2775](https://nvd.nist.gov/vuln/detail/CVE-2025-2775)** - 📝 SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read …

1
1.0
View Original High Risk
Reddit 1 month, 2 weeks ago
CloudGuardAI
Exploit PoC

Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access Cisco has confirmed active exploitation of **three unauthenticated remote code execution (RCE)** vulnerabilities in **Identity Services Engine (ISE)** and **ISE-Passive Identity Connector (ISE-PIC)**: * **CVE-2025-20281** (API command injection) * **CVE-2025-20282** (malicious file upload) * **CVE-2025-20337** (API command injection) All …

43
3
49.0
View Original High Risk
Reddit 1 month, 2 weeks ago
SolidBE

Security Updates Sharepoint, Netscaler en Cisco ISE **Ernstig beveiligingslek in Microsoft SharePoint wordt misbruikt** Het Nationaal Cyber Security Centrum (NCSC), Microsoft en het Amerikaanse cyberagentschap CISA slaan alarm: er wordt actief misbruik gemaakt van een kritieke kwetsbaarheid in Microsoft SharePoint. Dit lek, aangeduid als CVE-2025-53770, stelt aanvallers in staat om …

References

Published: 2025-06-25T16:11:42.285Z
Last Modified: 2025-07-28T19:41:32.601Z
Copied to clipboard!