
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability (CVE-2025-20281) was discovered in Cisco Identity Services Engine (ISE) and ISE-Passive Identity Connector (ISE-PIC) affecting versions 3.3 and later. The vulnerability allows an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system with root privileges without requiring any valid credentials. The vulnerability was disclosed on June 25, 2025, and received a maximum CVSS score of 10.0 (Cisco Advisory).
The vulnerability stems from insufficient validation of user-supplied input in a specific exposed API. An attacker can exploit this vulnerability by submitting a crafted API request to execute arbitrary operating system commands as the root user. The vulnerability has been assigned a Critical severity rating with a CVSS Base Score of 9.8 and vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The flaw is classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component) (NVD, Arctic Wolf).
A successful exploitation of this vulnerability allows attackers to obtain root privileges on affected devices, potentially leading to complete system compromise. The vulnerability affects Cisco ISE and ISE-PIC, which are critical network security policy management and access control platforms typically used by large enterprises, government organizations, universities, and service providers (Bleeping Computer).
Cisco has released software updates to address this vulnerability. For version 3.3, users should upgrade to 3.3 Patch 6 (ise-apply-CSCwo994493.3.0.430patch4-SPA.tar.gz), and for version 3.4, users should upgrade to 3.4 Patch 2 (ise-apply-CSCwo994493.4.0.608patch1-SPA.tar.gz). No workarounds are available for this vulnerability, making it critical to apply the security updates (Cisco Advisory).
Security researchers and industry experts have emphasized the severity of this vulnerability due to its maximum CVSS score and the critical nature of the affected systems. The vulnerability has received significant attention in the cybersecurity community, with multiple security firms and news outlets covering the issue and urging organizations to apply patches immediately (Bleeping Computer).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."