- Cisco has corrected an identity identity engine impacting on a maximum severity flaw and an ISE passive identity connector
- The defect has enabled threat stakeholders to execute an arbitrary code on the underlying operating system
- It was corrected in versions 3.3 and 3.4
Vulnerability of maximum severity has been recently discovered and corrected, in Cisco Identity Services Engine (ISE) and ISE Identity Connector (ISE-PIC). This defect allowed threat stakeholders to execute arbitrary code, with high privileges, on the operating system of the devices performing the tools.
ISE is a network safety and access control policies platform, helping organizations to manage centrally which and what can connect to their network. ISE-PIC, on the other hand, is a light service that collects identity information on users and devices without obliging it to authenticate themselves via traditional methods.
The two tools are generally used by IT teams and corporate cybersecurity that manage large or complex network environments.
The importance of the corrective
Recently, the security researcher Kentaro Kawane, of Cybersecurity OGM, discovered insufficient validation of the vulnerability of the entries provided by the user who could be exploited by submitting a request for made. Valid identification information is not required to mistreat the fault.
It is followed as CVE-2025-20337 and received a gravity score of 10/10 (criticism). It affects versions 3.3 and 3.4 of the tools, regardless of the configuration of the device. However, versions 3.2 or more are not affected.
Cisco addressed the faults of these versions:
– Cisco ISE or ISE-PIC Release 3.3 (fixed in 3.3 patch 7)
– Cisco ISE or ISE-PIC Release 3.4 (fixed in 3.4 patch 2)
The good news is that there is no evidence that vulnerability has been exploited in the wild by malicious actors. However, cybercriminals are only known to target organizations only after a public bug, because many entities do not rush to apply the fixes. By keeping the hardware and software exceeded, organizations keep their rear doors wide open and criminals get an easy way in the premises.
Therefore, it would be good to apply the fixes as soon as possible and prevent possible attacks.
Via The Hacker News