Cisco Patches Two Critical RCE Vulnerabilities in ISE and ISE-PIC

Cisco Patches Two Critical RCE Vulnerabilities in ISE and ISE-PIC

Cisco has issued an urgent advisory regarding two critical unauthenticated remote code execution (RCE) vulnerabilities impacting its Identity Services Engine (ISE) and Passive Identity Connector (ISE-PIC) products.

The flaws—CVE-2025-20281 and CVE-2025-20282—have each been assigned a CVSS severity score of 10.0, the highest possible rating. The first vulnerability affects ISE and ISE-PIC versions 3.3 and 3.4, while the second is limited to version 3.4.


Vulnerability Breakdown

CVE-2025-20281
Caused by insufficient input validation in an exposed API, this flaw allows an unauthenticated remote attacker to send specially crafted API requests and execute arbitrary commands with root privileges.

CVE-2025-20282
This vulnerability stems from inadequate file validation in an internal API. It enables unauthenticated attackers to upload arbitrary files to privileged directories, allowing malicious file execution with root-level access.


Why It Matters

Cisco ISE is a cornerstone of enterprise network security, providing:

  • Network Access Control (NAC)
  • Identity and device management
  • Policy enforcement and segmentation

It is widely deployed across enterprise networks, government infrastructure, higher education, and service providers. These vulnerabilities pose a severe risk of compromise, particularly if exploited before patches are applied.


Current Status & Mitigation

Cisco confirms that no active exploitation has been observed, and no public proof-of-concept exploits are currently available. However, given the unauthenticated RCE impact, immediate action is advised.

Affected Versions & Fixed Builds:

  • ISE/ISE-PIC 3.3 → Patch to:
    ise-apply-CSCwo99449_3.3.0.430_patch4 (Patch 6)
  • ISE/ISE-PIC 3.4 → Patch to:
    ise-apply-CSCwo99449_3.4.0.608_patch1 (Patch 2) or later

No workarounds are availablepatching is the only mitigation.


⏱ Why You Must Act Now

  • No authentication is required for exploitation
  • Successful attacks grant full root access
  • ISE is a high-value target for attackers seeking persistence and control
  • Enterprise impact could be severe if left unpatched

Organizations running Cisco ISE should prioritize patch deployment to avoid becoming a target of future exploits. These vulnerabilities have the potential to enable deep and persistent access to sensitive network infrastructure—making immediate remediation not just a best practice, but a necessity.

Read more