Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc

Cisco has released updates to address two critical security flaws Identity Services Engine (ISE) that could allow remote attackers to execute arbitrary commands and elevate privileges on susceptible devices.
The vulnerabilities are listed below -
- CVE-2025-20124 (CVSS score: 9.9) - An insecure Java deserialization vulnerability in an API of Cisco ISE that could permit an authenticated, remote attacker to execute arbitrary commands as the root user on an affected device.
- CVE-2025-20125 (CVSS score: 9.1) - An authorization bypass vulnerability in an API of Cisco ISE could could permit an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node
An attacker could weaponize either of the flaws by sending a crafted serialized Java object or an HTTP request to an unspecified API endpoint, leading to privilege escalation and code execution.
Cisco said the two vulnerabilities are not dependent on one another and that there are no workarounds to mitigate them. They have been addressed in the below versions -
- Cisco ISE software release 3.0 (Migrate to a fixed release)
- Cisco ISE software release 3.1 (Fixed in 3.1P10)
- Cisco ISE software release 3.2 (Fixed in 3.2P7)
- Cisco ISE software release 3.3 (Fixed in 3.3P4)
- Cisco ISE software release 3.4 (Not vulnerable)
Deloitte security researchers Dan Marin and Sebastian Radulea have been credited with discovering and repairing the vulnerabilities.
While the networking equipment major said it's not aware of any malicious exploitation of the flaws, users are advised to keep their systems up-to-date for optimal protection.
source: TheHackerNews
Free online web security scanner
Top News:

New NailaoLocker ransomware used against EU healthcare orgs
February 20, 2025
Windows Server 2025 released—here are the new features
November 5, 2024
Chinese hackers abuse Microsoft APP-v tool to evade antivirus
February 19, 2025
SpyLend Android malware downloaded 100,000 times from Google Play
February 22, 2025
Sniffnet: Free, open-source network monitoring
June 6, 2024