Cisco has released updates to address two critical security flaws Identity Services Engine (ISE) that could allow remote attackers to execute arbitrary commands and elevate privileges on susceptible devices.
The vulnerabilities are listed below –
- CVE-2025-20124 (CVSS score: 9.9) – An insecure Java deserialization vulnerability in an API of Cisco ISE that could permit an authenticated, remote attacker to execute arbitrary commands as the root user on an affected device.
- CVE-2025-20125 (CVSS score: 9.1) – An authorization bypass vulnerability in an API of Cisco ISE could could permit an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node
An attacker could weaponize either of the flaws by sending a crafted serialized Java object or an HTTP request to an unspecified API endpoint, leading to privilege escalation and code execution.
Cisco said the two vulnerabilities are not dependent on one another and that there are no workarounds to mitigate them. They have been addressed in the below versions –
- Cisco ISE software release 3.0 (Migrate to a fixed release)
- Cisco ISE software release 3.1 (Fixed in 3.1P10)
- Cisco ISE software release 3.2 (Fixed in 3.2P7)
- Cisco ISE software release 3.3 (Fixed in 3.3P4)
- Cisco ISE software release 3.4 (Not vulnerable)
Deloitte security researchers Dan Marin and Sebastian Radulea have been credited with discovering and repairing the vulnerabilities.
While the networking equipment major said it’s not aware of any malicious exploitation of the flaws, users are advised to keep their systems up-to-date for optimal protection.