Cisco reports perfect 10 critical remote code execution flaws in Identity Services Engine (ISE)
Take action: This one is very important. If you are using Cisco Identity Services Engine (ISE), drop everything and start planning a patch ASAP. ISE usually controls network access to a lot of the infrastructure, so you don't want it to be hacked. And hackers will quickly start abusing these flaws.
Learn More
Cisco has issued an emergency security advisory of two critical vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) platforms that could allow unauthenticated attackers to achieve complete system compromise.
Vulnerabilities summary
- CVE-2025-20281 (CVSS score 10): An API input validation vulnerability affecting Cisco ISE and ISE-PIC releases 3.3 and later. This flaw allows unauthenticated remote attackers to execute arbitrary code on the underlying operating system as root through insufficient validation of user-supplied input. Attackers can exploit this vulnerability by submitting crafted API requests.
- CVE-2025-20282 (CVSS score 10): An internal API file upload vulnerability affecting only Cisco ISE and ISE-PIC Release 3.4. This vulnerability stems from a lack of file validation checks that would prevent uploaded files from being placed in privileged directories on affected systems. Attackers can exploit this flaw by uploading crafted files to affected devices, allowing them to store malicious files on the system and subsequently execute arbitrary code with root privileges.
Cisco has released patches for all affected versions - ISE 3.3 Patch 6 for CVE-2025-20281 and ISE 3.4 Patch 2 for both vulnerabilities. The patches are distributed as specific patch files (ise-apply-CSCwo99449_3.3.0.430_patch4-SPA.tar.gz and ise-apply-CSCwo99449_3.4.0.608_patch1-SPA.tar.gz) that target the underlying security flaws while maintaining system functionality.
Cisco's Product Security Incident Response Team (PSIRT) claims that they are not currently aware of any public announcements or malicious exploitation of these vulnerabilities in the wild.
Organizations are strongly advised to prioritize applying these patches. There are no workarounds that address these vulnerabilities.
Update - As of 28th of July 2028, security researcher Bobby Gould published a PoC exploit chain for CVE-2025-20281 and CVE-2025-20337.