Cisco Patches Two Critical Identity Services Engine Flaws

Cisco has fixed two critical vulnerabilities in its Identity Services Engine (ISE) that could allow an authenticated remote attacker to execute arbitrary commands as root or access sensitive information, modify configurations, and reload affected devices.

As if requiring authentication wasn't a hurdle enough: Exploiting either of these 9.9 and 9.1-out-of-10-severity-rated bugs requires valid read-only administrative credentials. 

But assuming a miscreant can steal or buy these admin logins, they can essentially fully and quietly take over your equipment even after you think you've managed to keep them out. It's worth noting that NCC Group blamed last year's surge in ransomware attacks partly on compromised credentials, so it's not like these are too difficult to obtain. Rogue insiders can also abuse these holes, of course.

Both bugs affect Cisco ISE and Cisco ISE Passive Identity Connector (ISE-PIC) versions 3.0 to 3.3, regardless of device configuration, and both have patches available to apply. Version 3.4 is not vulnerable to either flaw; folks using earlier affected versions are advised to upgrade to a fixed release as detailed in the advisory. 

Cisco also issued instructions on upgrading a device, which can be viewed in its Upgrade Guides documentation located on the Cisco Identity Services Engine support page.

As of now, the networking vendor isn't aware of any in-the-wild exploits. Here are the details on both.

The first flaw, CVE-2025-20124, stems from the insecure deserialization of user-supplied Java byte streams in Cisco ISE, which is network access control software that enforces security policies and manages endpoints across enterprises' IT environments.

The flaw exists in an API of Cisco ISE, and an attacker could exploit it by sending a crafted serialized Java object to an affected API. "A successful exploit could allow the attacker to execute arbitrary commands on the device and elevate privileges," the networking giant warned in its security advisory.

Cisco credited Deloitte's Dan Marin and Sebastian Radulea with spotting and reporting this vulnerability.

The second bug, an authorization bypass vulnerability tracked as CVE-2025-20125, was also disclosed by Radulea.

"A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node," Cisco warned. 

This flaw is due to a specific API not performing authorization checks or properly validating user-supplied data, and can be triggered by sending an HTTP request to the API on the device.

Cisco also notes that the vulnerabilities are not dependent on each other, so exploiting one of the two isn't necessary to exploit the other.  

"In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability," the advisory added.

Both of these critical security holes follow an earlier 9.9-rated vulnerability in Cisco's Meeting Management tool that could allow a remote authenticated attacker with low privileges to escalate to administrator on affected devices. Cisco patched that flaw a couple of weeks ago. ®

RECENT NEWS

From Chip War To Cloud War: The Next Frontier In Global Tech Competition

The global chip war, characterized by intense competition among nations and corporations for supremacy in semiconductor ... Read more

The High Stakes Of Tech Regulation: Security Risks And Market Dynamics

The influence of tech giants in the global economy continues to grow, raising crucial questions about how to balance sec... Read more

The Tyranny Of Instagram Interiors: Why It's Time To Break Free From Algorithm-Driven Aesthetics

Instagram has become a dominant force in shaping interior design trends, offering a seemingly endless stream of inspirat... Read more

The Data Crunch In AI: Strategies For Sustainability

Exploring solutions to the imminent exhaustion of internet data for AI training.As the artificial intelligence (AI) indu... Read more

Google Abandons Four-Year Effort To Remove Cookies From Chrome Browser

After four years of dedicated effort, Google has decided to abandon its plan to remove third-party cookies from its Chro... Read more

LinkedIn Embraces AI And Gamification To Drive User Engagement And Revenue

In an effort to tackle slowing revenue growth and enhance user engagement, LinkedIn is turning to artificial intelligenc... Read more