Cisco has disclosed multiple critical security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could allow unauthenticated remote attackers to execute arbitrary commands with root privileges on affected systems. Organizations using affected Cisco ISE systems should prioritize immediate patching due to the critical nature of these vulnerabilities and the potential for complete system compromise. Cisco’s Product Security Incident Response Team reports no evidence of public exploitation or malicious use of these vulnerabilities at the time of disclosure. The first two vulnerabilities allow attackers to execute arbitrary code by submitting crafted API requests due to insufficient validation of user-supplied input. The network-accessible nature of these flaws, combined with their unauthenticated exploitation capability, creates an urgent security situation for affected organizations. The vulnerabilities were discovered through responsible disclosure by security researchers Bobby Gould of Trend Micro Zero Day Initiative and Kentaro Kawane of GMO Cybersecurity by Ierae. The three vulnerabilities stem from insufficient input validation in specific APIs within Cisco ISE and ISE-PIC systems. The independent nature of these vulnerabilities means that exploitation of one does not require exploitation of another, potentially providing multiple attack vectors for malicious actors.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 17 Jul 2025 02:40:12 +0000