Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TikTok users outraged by app’s ‘immigration status’ collection — What does this mean?

Waymo faces investigation by National Transportation Safety Board over illegal activities on school buses

The Rippling/Deal corporate spying scandal may have taken another outrageous turn.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cisco checks active exploits targeting defects in ISE and allows for unrecognized root access
Identity

Cisco checks active exploits targeting defects in ISE and allows for unrecognized root access

userBy userJuly 22, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 22, 2025Ravi LakshmananNetwork Security/Vulnerabilities

Active exploits targeting ISE flaws

On Monday, Cisco updated its advisory for a set of recently disclosed security flaws for the Identity Services Engine (ISE) and the ISE Passive Identity Connector (ISE-PIC) to acknowledge its aggressive exploitation.

“In July 2025, Cisco Psirt [Product Security Incident Response Team]has noticed attempts to exploit some of these vulnerabilities in the wild,” the company said with caution.

Network equipment vendors did not reveal which vulnerabilities were weaponized at the scale of their real-world attacks, threat actors’ identities, or activity.

Cisco ISE plays a central role in network access control, managing which users and devices are permitted to the corporate network and under what conditions. This layer of compromise allows attackers to give unlimited access to internal systems, bypass authentication controls, and cut down mechanisms.

All vulnerabilities outlined in the alert are all critical rate bugs (CVSS score: 10.0).

CVE-2025-20281 and CVE-2025-20337 – Multiple vulnerabilities in certain APIs allow uncertified remote attackers to run the underlying operating system as root CVE-2025-20282. As root in the underlying operating system

Cybersecurity

The first two flaws are the result of insufficient user-supported input validation, but the latter is due to the lack of file validation checks that prevent files uploaded to the privileged directories of the affected system from being placed.

As a result, an attacker can take advantage of these drawbacks by sending created API requests (for CVE-2025-20281 and CVE-2025-20337) or uploading the created files to the affected devices.

In light of aggressive exploitation, it is essential that customers upgrade to a fixed software release as soon as possible to fix these vulnerabilities. These flaws can be exploited remotely without authentication, resulting in high risk of previous remote code execution of unearned systems. This is the biggest concern for defenders managing critical infrastructure or compliance-driven environments.

Security teams should also check the system logs for suspicious API activity or uploading malformed files, especially in externally exposed deployments.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBetaworks’ third fund will close at $66 million and invest in early stage AI startups
Next Article The 21-year-old MIT Dropout raises $32 million at a $300 million valuation led by Insight
user
  • Website

Related Posts

CISA updates KEV catalog to fix four actively exploited software vulnerabilities

January 23, 2026

Fortinet Verifies Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls

January 23, 2026

TikTok establishes joint venture in the U.S. to continue business pursuant to 2025 Executive Order

January 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TikTok users outraged by app’s ‘immigration status’ collection — What does this mean?

Waymo faces investigation by National Transportation Safety Board over illegal activities on school buses

The Rippling/Deal corporate spying scandal may have taken another outrageous turn.

What you need to know about Netflix’s groundbreaking acquisition of Warner Bros.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.