Description
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Attack Vector
- network
- Complexity
- low
- Privileges
- none
- User Action
- none
- Scope
- changed
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- CWE-74
Metadata
- Primary Vendor
- CISCO
- Published
- 7/16/2025
- Last Modified
- 10/28/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
cisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connector
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.