Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Europol destroys Hacktivist Group linked to DDOS attacks against Ukraine

What security leaders need to know in 2025

Niobium-based carbon recycling can reduce industrial emissions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cisco warns of critical ISE flaws, allowing uncertified attackers to run route code
Identity

Cisco warns of critical ISE flaws, allowing uncertified attackers to run route code

userBy userJuly 17, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 17, 2025Ravi LakshmananVulnerability/Network Security

Important ISE defects

Cisco has revealed a new maximum security vulnerability affecting the Identity Services Engine (ISE) and the Cisco ISE Passive Identity Connector (ISE-PIC).

This drawback, tracked as CVE-2025-20337, is similar to CVE-2025-20281, which has a CVSS score of 10.0 and was patched by the Networking Equipment Major later last month.

“Several vulnerabilities in certain APIs in Cisco ISE and Cisco ISE-PIC allow unrecognized remote attackers to run arbitrary code on the underlying operating system as root. The attackers do not require valid credentials to enable these vulnerabilities.

Cybersecurity

“These vulnerabilities are due to insufficient user validation of inputs that are supported. Attackers can exploit these vulnerabilities by sending created API requests. A successful exploit allows the attacker to gain root privileges on the affected device.”

Kentaro Kawane of GMO Cybersecurity is believed to have discovered and reported the flaws. Kawane was previously recognized for two other significant Cisco ISE flaws (CVE-2025-20286 and CVE-2025-20282) and another important bug in Fortinet Fortiweb (CVE-2025-25257).

CVE-2025-20337 affects ISE and ISE-PIC releases 3.3 and 3.4 regardless of device configuration. It does not affect ISE and ISE-PIC releases prior to release 3.2. This issue has been patched in the following versions –

Cisco ISE or ISE-PIC Release 3.3 (fixed with 3.3 patch 7) Cisco ISE or ISE-PIC Release 3.4 (fixed with 3.4 patch 2)

There is no evidence that the vulnerability was exploited in a malicious context. That said, ensuring that your system is kept up to date to avoid potential threats is always a good practice.

The Shadowserver Foundation reported that since July 11, 2025, it is likely that threat targets are exploiting publicly released exploits related to CVE-2025-25257.

Cybersecurity

As of July 15th, it is estimated that there will be 77 infection instances, down from 85 the previous day. Most of the compromises are concentrated in North America (44), Asia (14), and Europe (13).

Data from the Attack Surface Management Platform data indicates that 20,098 Fortinet FortiWeb appliances, excluding Honeypots, are online, but it is currently unclear whether many of these are vulnerable to CVE-2025-25257.

“This flaw allows uncertified attackers to execute arbitrary SQL commands via created HTTP requests, leading to remote code execution (RCE),” Censys said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAtlanta, Dallas Area, launches the Robotaxi RideShare fleet
Next Article UK launches electric vehicle grants to enable green transitions
user
  • Website

Related Posts

Europol destroys Hacktivist Group linked to DDOS attacks against Ukraine

July 17, 2025

What security leaders need to know in 2025

July 17, 2025

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

July 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Europol destroys Hacktivist Group linked to DDOS attacks against Ukraine

What security leaders need to know in 2025

Niobium-based carbon recycling can reduce industrial emissions

Goethe University Catalyst leads a new era of PFA degradation

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.