CVE-2021-1306
Cisco ISE vulnerability analysis and mitigation

A vulnerability in the restricted shell of Cisco Evolved Programmable Network (EPN) Manager, Cisco Identity Services Engine (ISE), and Cisco Prime Infrastructure could allow an authenticated, local attacker to identify directories and write arbitrary files to the file system. This vulnerability is due to improper validation of parameters that are sent to a CLI command within the restricted shell. An attacker could exploit this vulnerability by logging in to the device and issuing certain CLI commands. A successful exploit could allow the attacker to identify file directories on the affected device and write arbitrary files to the file system on the affected device. To exploit this vulnerability, the attacker must be an authenticated shell user.


SourceNVD

Related Cisco ISE vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20343HIGH7.5
  • Cisco ISECisco ISE
  • cpe:2.3:a:cisco:identity_services_engine
NoNoNov 05, 2025
CVE-2025-20304MEDIUM5.4
  • Cisco ISECisco ISE
  • cpe:2.3:a:cisco:identity_services_engine
NoNoNov 05, 2025
CVE-2025-20303MEDIUM5.4
  • Cisco ISECisco ISE
  • cpe:2.3:a:cisco:identity_services_engine
NoNoNov 05, 2025
CVE-2025-20289MEDIUM5.4
  • Cisco ISECisco ISE
  • cpe:2.3:a:cisco:identity_services_engine
NoNoNov 05, 2025
CVE-2025-20305MEDIUM4.9
  • Cisco ISECisco ISE
  • cpe:2.3:a:cisco:identity_services_engine
NoNoNov 05, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management