CVE-2025-20282

A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device and then execute those files on the underlying operating system as root. This vulnerability is due a lack of file validation checks that would prevent uploaded files from being placed in privileged directories on an affected system. An attacker could exploit this vulnerability by uploading a crafted file to the affected device. A successful exploit could allow the attacker to store malicious files on the affected system and then execute arbitrary code or obtain root privileges on the system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.4.0:patch1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.4.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.4.0:patch1:*:*:*:*:*:*

History

26 Jun 2025, 20:35

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.4.0:patch1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.4.0:patch1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.4.0:-:*:*:*:*:*:*
First Time Cisco identity Services Engine Passive Identity Connector
Cisco
Cisco identity Services Engine
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6 - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6 - Vendor Advisory

26 Jun 2025, 18:57

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad en una API interna de Cisco ISE y Cisco ISE-PIC podría permitir que un atacante remoto no autenticado cargue archivos arbitrarios en un dispositivo afectado y los ejecute en el sistema operativo subyacente como root. Esta vulnerabilidad se debe a la falta de comprobaciones de validación de archivos que impedirían que los archivos cargados se colocaran en directorios privilegiados en un sistema afectado. Un atacante podría explotar esta vulnerabilidad subiendo un archivo manipulado al dispositivo afectado. Una explotación exitosa podría permitirle almacenar archivos maliciosos en el sistema afectado y luego ejecutar código arbitrario u obtener privilegios de root.

25 Jun 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-25 17:15

Updated : 2025-06-26 20:35


NVD link : CVE-2025-20282

Mitre link : CVE-2025-20282

CVE.ORG link : CVE-2025-20282


JSON object : View

Products Affected

cisco

  • identity_services_engine
  • identity_services_engine_passive_identity_connector
CWE
CWE-269

Improper Privilege Management