HomeCiscoCVE-2025-20337

CVE-2025-20337

CRITICAL
10.0CVSS
Published: 2025-07-16
Updated: 2025-10-28
AI Analysis

Description

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
changed
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-74

Metadata

Primary Vendor
CISCO
Published
7/16/2025
Last Modified
10/28/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

cisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_enginecisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connectorcisco : identity_services_engine_passive_identity_connector

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief