HomeVulnerabilityExploit out there for important Cisco ISE bug exploited in assaults

Exploit out there for important Cisco ISE bug exploited in assaults

Safety researcher Bobby Gould has revealed a weblog submit demonstrating an entire exploit chain for CVE-2025-20281, an unauthenticated distant code execution vulnerability in Cisco Identification Companies Engine (ISE).

The important vulnerability was first disclosed on June 25, 2025, with Cisco warning that it impacts ISE and ISE-PIC variations 3.3 and three.4, permitting unauthenticated, distant attackers to add arbitrary information to the goal system and execute them with root privileges.

The difficulty stems from unsafe deserialization and command injection within the enableStrongSwanTunnel() methodology.

Three weeks later, the seller added yet another flaw to the identical bulletin, CVE-2025-20337, which pertains to the identical flaw however is now damaged down into two components, CVE-2025-20281 (command injection) and CVE-2025-20337 (deserialization).

Though hotfixes had been beforehand made out there, Cisco urged customers to replace to three.3 Patch 7 and three.4 Patch 2 to deal with each vulnerabilities.

On July 22, 2025, Cisco marked each CVE-2025-20281 and CVE-2025-20337 as actively exploited in assaults, urging admins to use the security updates as quickly as doable.

See also  Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency through Undertaking Zero

With adequate time having handed, permitting directors to use the updates, Gould has now revealed his write-up, the place he demonstrates triggering the command injection flaw in Cisco ISE through a serialized Java String[] payload.

The researcher achieves arbitrary command execution as root inside a Docker container by exploiting the habits of Java’s Runtime.exec() and utilizing ${IFS} to bypass argument tokenization points.

Lastly, Gould demonstrates learn how to escape from the privileged Docker container and acquire root entry on the host system utilizing a well known Linux container escape approach primarily based on cgroups and release_agent.

Malicious request triggering the exploit
Malicious request triggering the exploit
Supply: zerodayinitiative.com

Though Gould’s write-up is not a weaponized exploit script hackers can instantly plug into their assault chain, it supplies all of the technical particulars and payload construction crucial for expert hackers to recreate the entire exploit.

Even when energetic exploitation within the wild is already underway, the discharge of this exploit is certain to extend malicious exercise.

See also  Why Coaching is Vital to Implementing Cisco HyperShield

There are not any workarounds for this vulnerability, so making use of the patches as directed within the vendor’s bulletin is the really helpful plan of action.

Wiz

CISOs know that getting board buy-in begins with a transparent, strategic view of how cloud security drives enterprise worth.

This free, editable board report deck helps security leaders current threat, affect, and priorities in clear enterprise phrases. Flip security updates into significant conversations and quicker decision-making within the boardroom.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular