Vulnerability Description
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root. This vulnerability is due to insufficient validation of user-supplied input. An attacker with valid credentials could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, the attacker must have valid high-privileged credentials.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Identity Services Engine | < 3.3.0 |
| Cisco | Identity Services Engine Passive Identity Connector | < 3.3.0 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-20283?
CVE-2025-20283 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root. This vulnerabili...
How severe is CVE-2025-20283?
CVE-2025-20283 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-20283?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Identity Services Engine, Cisco Identity Services Engine Passive Identity Connector.