V
Scaner-VSvulnerability catalog · v4.2
CVE-2025-20281
CVE
Critical KEVConfirmedExploit available

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary cod…

CVSS
10.0
Critical
EPSS
0.28
p96
Published
2025-01-01
Updated
2025-07-28
Description

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.

Tags · CWE
KEVPre-auth
CWE-74
CAPEC-3
CAPEC-6
CAPEC-7
CAPEC-8
CAPEC-9
CAPEC-10
CAPEC-13
CAPEC-14
CAPEC-24
CAPEC-28
CAPEC-34
CAPEC-42
CAPEC-43
CAPEC-45
CAPEC-46
CAPEC-47
CAPEC-51
CAPEC-52
CAPEC-53
CAPEC-64
CAPEC-67
CAPEC-71
CAPEC-72
CAPEC-76
CAPEC-78
CAPEC-79
CAPEC-80
CAPEC-83
CAPEC-84
CAPEC-101
CAPEC-105
CAPEC-108
CAPEC-120
CAPEC-135
CAPEC-250
CAPEC-267
CAPEC-273
Affected products
Identity_services_engineIdentity_services_engine_passive_identity_connector
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Timeline
2025-01-01
Published
2025-07-28
Added to KEV
2025-07-28
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: N
None (N)
User Interaction
UI: N
None (N)
Scope
S: C
Changed (C)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: H
High (H)
Availability Impact
A: H
High (H)
Exploit indicators
EPSS
0.282 · p96
Known exploited (KEV)
Yes
MITRE ATT&CK
Inferred via CAPEC
Known exploits — Сканер-ВС
CVE-2025-20281
github-poc · https://github.com/ill-deed/Cisco-CVE-2025-20281-illdeed
Enterprise
Affected software
ProductVendorStatus
identity_services_engine*Exploited
identity_services_engine_passive_identity_connector*Exploited
Source databases
CVE
Related vulnerabilities