Active Exploits Targeting Cisco ISE Vulnerabilities
On July 22, 2025, Cisco issued an alert acknowledging the active exploitation of serious security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC). This update comes from the Cisco Product Security Incident Response Team (PSIRT), which has recently identified attempts to exploit some of these vulnerabilities.
Understanding the Threat
While Cisco has not disclosed specific details about the vulnerabilities that have been weaponized or the identities of the threat actors involved, the implications are concerning for organizations that rely on Cisco’s network security solutions. The ISE platform is integral to network access control, managing which users and devices can access corporate networks and the conditions of that access. A successful compromise at this level could enable attackers to gain unrestricted access to internal systems, effectively bypassing authentication controls and security logging.
Overview of Vulnerabilities
The vulnerabilities highlighted in Cisco’s advisory are rated critical, with CVSS scores peaking at 10.0. These flaws could allow unauthorized remote attackers to execute commands on the underlying operating system with root access, significantly endangering the systems involved. Below are key vulnerabilities listed:
-
CVE-2025-20281 & CVE-2025-20337: These involve multiple vulnerabilities in a specific API that can be exploited by unauthenticated, remote attackers to run arbitrary code on the operating system as root.
- CVE-2025-20282: This vulnerability pertains to an internal API flaw that permits unauthenticated, remote attackers to upload arbitrary files to affected devices, followed by execution of those files as root.
Nature of the Flaws
The first two vulnerabilities arise from the inadequate validation of user-supplied input. In contrast, CVE-2025-20282 stems from a lack of proper file validation, allowing uploaded files to be placed in privileged directories. Attackers can exploit these weaknesses by sending crafted API requests for the first two vulnerabilities, or by uploading specially-crafted files to target devices in relation to CVE-2025-20282.
Urgency for Remediation
Given the active exploitation of these flaws, it is crucial for Cisco ISE users to promptly upgrade to the latest software releases where fixes have been implemented. The vulnerabilities are particularly threatening as they can be exploited remotely without requiring authentication. This places unpatched systems at a significant risk of pre-authenticated remote code execution, a pressing concern for organizations managing critical infrastructure or operating in compliance-driven environments.
Monitoring for Suspicious Activity
Security teams should proactively monitor their system logs for any unusual API activity or unauthorized file uploads, particularly in setups that are externally exposed. Implementing these precautionary measures is vital for organizations seeking to safeguard their networks against these identified threats.
Conclusion
The security landscape continues to evolve with emerging vulnerabilities and active exploitation threats. Cisco’s acknowledgment of current risks associated with ISE vulnerabilities underscores the importance of vigilance and prompt action in network security. By staying informed and taking immediate steps to fortify systems, organizations can defend against potential breaches effectively.


