Cisco has launched updates to handle two essential security flaws Id Companies Engine (ISE) that would permit distant attackers to execute arbitrary instructions and elevate privileges on inclined units.
The vulnerabilities are listed under –
- CVE-2025-20124 (CVSS rating: 9.9) – An insecure Java deserialization vulnerability in an API of Cisco ISE that would allow an authenticated, distant attacker to execute arbitrary instructions as the basis consumer on an affected gadget.
- CVE-2025-20125 (CVSS rating: 9.1) – An authorization bypass vulnerability in an API of Cisco ISE might might allow an authenticated, distant attacker with legitimate read-only credentials to acquire delicate data, change node configurations, and restart the node
An attacker might weaponize both of the failings by sending a crafted serialized Java object or an HTTP request to an unspecified API endpoint, resulting in privilege escalation and code execution.

Cisco mentioned the 2 vulnerabilities aren’t depending on each other and that there aren’t any workarounds to mitigate them. They’ve been addressed within the under variations –
- Cisco ISE software program launch 3.0 (Migrate to a set launch)
- Cisco ISE software program launch 3.1 (Fastened in 3.1P10)
- Cisco ISE software program launch 3.2 (Fastened in 3.2P7)
- Cisco ISE software program launch 3.3 (Fastened in 3.3P4)
- Cisco ISE software program launch 3.4 (Not susceptible)
Deloitte security researchers Dan Marin and Sebastian Radulea have been credited with discovering and repairing the vulnerabilities.
Whereas the networking gear main mentioned it is not conscious of any malicious exploitation of the failings, customers are suggested to maintain their methods up-to-date for optimum safety.