Home Cisco CVE-2025-20281
CRITICAL: THIS VULNERABILITY IS ACTIVELY BEING EXPLOITED IN THE WILD (CISA KEV CATALOG)
Back to Cisco

CVE-2025-20281

Exploited

Cisco ISE - API

Cisco CVSS 10 Updated March 16, 2026

Executive Risk Summary

"A vulnerability in the Cisco ISE API could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. This vulnerability is due to insufficient validation of user-supplied input and can be exploited by submitting a crafted API request."

Operational Audit Arsenal

Target Type Firmware Image
Target Asset Cisco ISE
Standard Path Global Firmware

Manual Verification Required

This is a non-Windows asset (Cisco). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

High

Internal Work Notes

CVE-2025-20281: Unauthenticated Remote Code Execution vulnerability in Cisco ISE API, requiring immediate patching to prevent potential root-level code execution.

Intelligence Sources

Related Cisco Threats

Scope of Impact

Cisco Identity Services Engine Passive Identity Connector (Version 3.4.0)Cisco Identity Services Engine (Version 3.3.0)Cisco Identity Services Engine Passive Identity Connector (Version 3.3.0)Cisco Identity Services Engine (Version 3.4.0)

Original NVD Description

"A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device."

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.