CVE-2025-20337

Cisco · Cisco Identity Services Engine (ISE) and Cisco Identity Services Engine-Private Cloud (ISE-PIC)

A critical vulnerability has been identified in Cisco Identity Services Engine (ISE) and related products, assigned a maximum severity score of 10.0.

Executive summary

A critical vulnerability has been identified in Cisco Identity Services Engine (ISE) and related products, assigned a maximum severity score of 10.0. This flaw allows a remote attacker, without any authentication, to gain complete control over the affected system by sending a malicious request to a specific API. Successful exploitation could lead to a total compromise of the network's security and access control infrastructure, posing a severe risk to the organization.

Vulnerability

The vulnerability exists within a specific, unnamed API endpoint on the Cisco ISE and ISE-PIC platforms. An unauthenticated, remote attacker can send a specially crafted request to this vulnerable API. Due to improper input validation or a flaw in the API's logic, this request is processed in a way that allows the attacker to execute arbitrary code on the underlying operating system with the highest possible privileges (root). No user interaction or credentials are required for a successful attack.

Business impact

Business Impact This vulnerability is rated as critical severity with a CVSS score of 10.0, representing the highest possible risk. Cisco ISE is a foundational component of network security, responsible for enforcing access policies for users and devices. A successful exploit would grant an attacker complete control over the ISE appliance, leading to a total loss of confidentiality, integrity, and availability. An attacker could bypass all network access controls, create unauthorized administrative accounts, exfiltrate sensitive data, deploy ransomware, or use the compromised ISE appliance as a pivot point to launch further attacks across the entire network.

Remediation

Immediate Action: The primary remediation is to immediately apply the security patches provided by Cisco. All instances of Cisco ISE and ISE-PIC should be upgraded to a fixed software version as outlined in the vendor's security advisory. Due to the remote and unauthenticated nature of this vulnerability, patching of internet-facing or otherwise exposed systems must be prioritized.

Proactive Monitoring: Security teams should actively monitor for signs of exploitation. Review API access logs on ISE/ISE-PIC appliances for unusual or malformed requests, especially from untrusted IP addresses. Monitor network traffic to and from the management interfaces for anomalous patterns or connections. On the appliance itself, look for unexpected processes, outbound network connections, new user accounts, or unauthorized modifications to system files and configurations.

Compensating Controls: If patching cannot be performed immediately, implement compensating controls to reduce the attack surface. Use a firewall or Access Control Lists (ACLs) to strictly limit access to the ISE/ISE-PIC management interfaces and APIs, allowing connections only from a dedicated, trusted management network. If the specific vulnerable API endpoint is identified, a Web Application Firewall (WAF) could potentially be configured with rules to block malicious requests, acting as a virtual patch.

Exploitation status

Public Exploit Available: False

Analyst recommendation

This vulnerability represents a critical and immediate threat to the security of the network. We strongly recommend that organizations treat this as an emergency and apply the vendor-supplied patches to all affected Cisco ISE and ISE-PIC systems without delay. Although this CVE is not currently on the CISA KEV list, its characteristics (unauthenticated RCE, CVSS 10.0) make it a prime candidate for future inclusion. Prioritize patching, verify system integrity, and implement the recommended monitoring and compensating controls to protect against this severe threat.