News: 1752777884

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Watch out, another max-severity, make-me-root Cisco bug on the loose

(2025/07/17)


Cisco has issued a patch for a critical 10 out of 10 severity bug in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could allow an unauthenticated, remote attacker to run arbitrary code on the operating system with root-level privileges.

ISE is a network access control and security policy management platform, and ISE-PIC centralizes identity management across security tools. And this vulnerability, tracked as [1]CVE-2025-20337 , is about the worst of the worst, allowing miscreants to take total control of compromised computers easily. In other words - patch now.

The vendor disclosed CVE-2025-20337 on Wednesday in an update to a June security advisory about [2]two other max-severity flaws in the same products. The new bug is related to [3]CVE-2025-20281 , one of the two disclosed in June, which also received a 10 CVSS rating and affects ISE and ISE-PIC releases 3.3 and 3.4, regardless of device configuration.

[4]

"These vulnerabilities are due to insufficient validation of user-supplied input," Cisco [5]noted . "An attacker could exploit these vulnerabilities by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device."

[6]

[7]

There are no workarounds, but Cisco has released a [8]software update that fixes both flaws, along with another critical-rated bug tracked as [9]CVE-2025-20282 disclosed in June.

The vendor noted that since the original publication of the security advisory last month, "improved fixed releases have become available" and customers should upgrade as follows:

If Cisco ISE is running Release 3.4 Patch 2, no further action is necessary.

If Cisco ISE is running Release 3.3 Patch 6, additional fixes are available in Release 3.3 Patch 7, and the device must be upgraded.

If Cisco ISE has either hot patch ise-apply-CSCwo99449_3.3.0.430_patch4-SPA.tar.gz or hot patch ise-apply-CSCwo99449_3.4.0.608_patch1-SPA.tar.gz installed, Cisco recommends upgrading to Release 3.3 Patch 7 or Release 3.4 Patch 2. The hot patches did not address CVE-2025-20337.

Cisco credited Bobby Gould of Trend Micro Zero Day Initiative with reporting CVE-2025-20281, and Kentaro Kawane of GMO Cybersecurity by Ierae, working with ZDI, for both CVE-2025-20282 and CVE-2025-20337.

Dustin Childs, head of threat awareness at ZDI, told The Register that CVE-2025-20281 and CVE-2025-20337 are different, albeit similar, vulnerabilities.

[10]

"After viewing the patch fixes for CVE-2025-20281 and CVE-2025-20337, it became evident that these should have been assigned two separate CVEs," he said. "The fixes were in different sections of code even though the bug type itself was identical."

[11]Cisco fixes two critical make-me-root bugs on Identity Services Engine components

[12]Cisco scores a perfect 10 - sadly for a critical flaw in its comms platform

[13]Crims hijacking fully patched SonicWall VPNs to deploy stealthy backdoor and rootkit

[14]CVSS 10 RCE in Wing FTP exploited within 24 hours, security researchers warn

There are no known exploits — yet — for any of these vulnerabilities, according to Cisco. But it's very hard for both ethical security researchers and criminals alike to resist poking make-me-root security holes, so we'd expect to see both proof-of-concept and in-the-wild exploits soon.

"It's certainly concerning – especially since the bug rates a CVSS score of 10," Childs said, referring to the newly disclosed CVE. "It will likely be targeted by threat actors, but to date, we are not aware of any exploitation in the wild."

Earlier this month, Cisco scored [15]another perfect 10 for a different vulnerability, this one in its Unified Communications Manager and Session Management Edition products. The Engineering-Special (ES) builds of both have hardcoded credentials baked in, and would allow an unauthenticated, remote attacker root access. ®

Get our [16]Tech Resources



[1] https://nvd.nist.gov/vuln/detail/CVE-2025-20337

[2] https://www.theregister.com/2025/06/26/patch_up_cisco_fixes_two/

[3] https://nvd.nist.gov/vuln/detail/CVE-2025-20281

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aHlydFgSB4nstdO9_2lyfAAAAMA&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[5] https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aHlydFgSB4nstdO9_2lyfAAAAMA&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aHlydFgSB4nstdO9_2lyfAAAAMA&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[8] https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu

[9] https://nvd.nist.gov/vuln/detail/CVE-2025-20282

[10] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/patches&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aHlydFgSB4nstdO9_2lyfAAAAMA&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[11] https://www.theregister.com/2025/06/26/patch_up_cisco_fixes_two/

[12] https://www.theregister.com/2025/07/02/cisco_patch_cvss/

[13] https://www.theregister.com/2025/07/16/sonicwall_vpn_hijack/

[14] https://www.theregister.com/2025/07/11/1010_wing_ftp_bug_exploited/

[15] https://www.theregister.com/2025/07/02/cisco_patch_cvss/

[16] https://whitepapers.theregister.com/



Paul Crawford

With such evidently piss-poor software from the likes of Cisco, SonicWall, etc, who needs Chinese backdoors?

Androgynous Cow Herd

the Chinese?

What is the tally now for Cisco?

VoiceOfTruth

Isn't it time that free countries declared Cisco a constant threat to national security, remove it and ban it except for use at a small whelk stall in Canvey Island?

Imagine if this was Huawei. The finger pointers would have run out of fingers and toes long ago. Cisco = American = free pass.

Re: What is the tally now for Cisco?

Anonymous Coward

Free Pass ???

Not any more ... Everything has a price in the New 'Born Again' US of A !!!

:)

The Worst Car Hire Service
When David Schwartz left university in 1972, he set up Rent-a-wreck
as a joke. Being a natural prankster, he acquired a fleet of beat-up
shabby, wreckages waiting for the scrap heap in California.
He put on a cap and looked forward to watching people's faces as he
conducted them round the choice of bumperless, dented junkmobiles.
To his lasting surprise there was an insatiable demand for them and
he now has 26 thriving branches all over America. "People like driving
round in the worst cars available," he said. Of course they do.
"If a driver damages the side of a car and is honest enough to
admit it, I tell him, `Forget it'. If they bring a car back late we
overlook it. If they've had a crash and it doesn't involve another vehicle
we might overlook that too."
"Where's the ashtray?" asked one Los Angeles wife, as she settled
into the ripped interior. "Honey," said her husband, "the whole car's the
ash tray."
-- Stephen Pile, "The Book of Heroic Failures"