Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Critical RCE flaws in Cisco ISE and ISE-PIC allow uncertified attackers to gain root access
Identity

Critical RCE flaws in Cisco ISE and ISE-PIC allow uncertified attackers to gain root access

userBy userJune 26, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 26, 2025Ravi LakshmananVulnerabilities, network security

Unrecognized attackers to get root access

Cisco has released an update to address two maximum security flaws: the Identity Services Engine (ISE) and the ISE Passive Identity Connector (ISE-PIC).

Vulnerabilities assigned to CVE Identifiers CVE-2025-20281 and CVE-2025-20282 each have a CVSS score of 10.0. The explanation of the defect is below –

CVE-2025-20281-CVE-2025-20281- Unauthenticated remote code execution vulnerability affecting Cisco releases that affect Cisco ISE and ISE-PIC releases that affect Cisco ISE and ISE-PIC releases that affect Cisco ISE and ISE-PIC releases that affect Cisco ISE and ISE-PIC releases that affect Cisco. This allows unrecognized remote attackers to run arbitrary code from the underlying operating system as root CVE-CVE-2025-20282 as root CVE-2025-20282 as root CVE-2025-20282 as root CVE-2025-20282 as root CVE-2025-20282 as root CVE-2025-20282 as root CVE-2025-20282 as root CVE-2025-20282 as root CVE-2025-20282. Uncertified remote attackers to upload any file to an affected device and run those files as root on the underlying operating system

CISCO said that CVE-2025-20281 can be used by attackers sending API requests created by gaining high privileges and running commands because users are insufficiently validating the supplemented input.

Cybersecurity

In contrast, CVE-2025-20282 is due to the lack of file validation checks that prevent uploaded files from being placed in privileged directories.

“If the exploit is successful, an attacker can save the malicious file on the affected system, run arbitrary code, or gain root privileges on the system,” Cisco said.

The networking equipment vendor said there was no workaround to address the issue. The drawbacks are addressed in the following versions –

CVE-2025-20281-CISCO ISE or ISE-PIC 3.3 Patch 6 (ISE-APPLY-CSCWO99449_3.3.0.430_Patch4-Spa.tar.gz), 3.4 Patch 2 (ISE-Apply-CSCWO99449_3.4.0.608_Patch1-Spa.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar.Tar 3.4 Patch 2 (ISE-Apply-CSCWO99449_3.4.0.608_Patch1-Spa.tar.gz)

The company praised Bobby Gould of the Trend Micro Zero Day Initiative and GMO Cybersecurity’s Kentarokawan for reporting CVE-2025-20281. Kawane, who previously reported CVE-2025-20286 (CVSS score: 9.9), has also been recognized for reporting CVE-2025-20282.

There is no evidence that vulnerabilities are being exploited in the wild, but it is essential that users move quickly to apply fixes to protect against potential threats.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIf you threaten an AI chatbot, it will lie, cheat and warn you to stop you, “Let me die.”
Next Article YouTube adds Carousel search results like AI overview
user
  • Website

Related Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

July 18, 2025

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.