Emergency Security Bulletin: Cisco ISE Unauthenticated Remote Code Execution via API Injection

https://www.redlegg.com/hubfs/Theme-2024/overlay-red.png featured image

By: RedLegg's Cyber Threat Intelligence Team

About:

RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.


VULNERABILITIES

Cisco ISE Unauthenticated Remote Code Execution via API Injection

 

CVSS Score: 10.0 (Critical)
Identifier: CVE-2025-20337
Exploit or POC: No
Update CVE-2025-20337 – Cisco Security Advisory

Description: CVE-2025-20337 is a critical vulnerability in Cisco Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) versions 3.3 and 3.4. The flaw arises from insufficient validation of user-supplied input in an internal API, allowing an unauthenticated, remote attacker to submit crafted requests that result in arbitrary command execution as the root user. Exploitation requires no authentication and can lead to full system compromise.


Affected versions include:

  • Cisco ISE 3.3 (prior to Patch 7)

  • Cisco ISE 3.4 (prior to Patch 2)

Although no confirmed exploitation has been seen in the wild, the vulnerability is highly critical and could be rapidly leveraged by attackers due to its ease of exploitation and impact.


Mitigation Recommendation: Upgrade immediately to Cisco ISE 3.3 Patch 7 or 3.4 Patch 2 (or later). Restrict access to management interfaces until patched, monitor for unusual activity, and validate system integrity post-upgrade. Patching remains the only effective mitigation strategy.