Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Cisco warns of critical flaws in its ISE security products

The flaws could permit an unauthenticated, remote attacker to execute arbitrary commands on affected systems

byAytun Çelebi
July 22, 2025
in Cybersecurity, News
Home News Cybersecurity

Cisco issued an advisory on July 17 concerning severe vulnerabilities within its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC), which could permit an unauthenticated remote attacker to execute commands with root privileges.

Cisco released multiple patches to address these issues, including an expanded fix for specific software versions. The vulnerabilities were initially reported by Bobby Gould of Trend Micro Zero Day Initiative and Kentaro Kawane of GMO Cybersecurity by Ierae, collaborating with Trend Micro Zero Day Initiative. These vulnerabilities enable arbitrary code execution on affected systems.

Three specific vulnerabilities are addressed by Cisco’s patches: CVE-2025-20281, CVE-2025-20337, and CVE-2025-20282. Although all three allow for arbitrary code execution, they are distinct and do not require combined exploitation for effectiveness. CVE-2025-20281 and CVE-2025-20337 affect both Cisco ISE and Cisco ISE-PIC. An attacker could exploit these by submitting a crafted API request, leveraging insufficient validation of user-supplied input, which could result in root-level privileges.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.


A critical flaw in Nvidia’s toolkit allows AI container escapes


CVE-2025-20282 specifically impacts Cisco ISE and ISE-PIC Release 3.4. This vulnerability could be exploited by an attacker uploading a crafted file to the device. Due to a lack of file validation, the malicious file could be placed in privileged directories, subsequently allowing the attacker to execute arbitrary code or gain root access. Cisco has stated it is not aware of any active exploitation of these vulnerabilities at this time.

Cisco ISE installations are considered patched against these vulnerabilities if they are running Release 3.4 Patch 2 or Release 3.3 Patch 6 (with Release 3.3 Patch 7). While Cisco had previously released hot patches, these have been superseded by the versions listed. The company has also provided documentation detailing the process for applying these updates.

In related cybersecurity developments, Cisco’s security intelligence division, Talos, recently identified a threat actor group utilizing generative AI as a lure to distribute malware. This group employed a spoofed version of a legitimate business’s website to disseminate the CyberLock ransomware, which encrypted specific documents on victims’ computers. The deceptive website offered a downloadable version of ChatGPT as bait. Separately, in March, Cisco initiated a digital skills training program across the European Union through its Networking Academy, offering free courses to enhance individuals’ networking and cybersecurity skills.


Featured image credit

Tags: CiscoFeatured

Related Posts

Is Grok 5 a revolution in AI or just Elon Musk’s latest overhyped vision?

Is Grok 5 a revolution in AI or just Elon Musk’s latest overhyped vision?

September 3, 2025
ICMP: Gemini, Claude and Llama 3 used music without any license

ICMP: Gemini, Claude and Llama 3 used music without any license

September 3, 2025
YouTube Premium cracks down on out-of-home family plans

YouTube Premium cracks down on out-of-home family plans

September 3, 2025
J-ENG unveils 7UEC50LSJA-HPSCR ammonia ship engine

J-ENG unveils 7UEC50LSJA-HPSCR ammonia ship engine

September 3, 2025
Judge rules Google won’t have to sell Chrome browser

Judge rules Google won’t have to sell Chrome browser

September 3, 2025
ShinyHunters uses vishing to breach Salesforce data

ShinyHunters uses vishing to breach Salesforce data

September 3, 2025

LATEST NEWS

Is Grok 5 a revolution in AI or just Elon Musk’s latest overhyped vision?

ICMP: Gemini, Claude and Llama 3 used music without any license

YouTube Premium cracks down on out-of-home family plans

J-ENG unveils 7UEC50LSJA-HPSCR ammonia ship engine

Judge rules Google won’t have to sell Chrome browser

ShinyHunters uses vishing to breach Salesforce data

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.