Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w8p2-wjjr-hr24

Опубликовано: 26 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 10

Описание

A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device and then execute those files on the underlying operating system as root.

This vulnerability is due a lack of file validation checks that would prevent uploaded files from being placed in privileged directories on an affected system. An attacker could exploit this vulnerability by uploading a crafted file to the affected device. A successful exploit could allow the attacker to store malicious files on the affected system and then execute arbitrary code or obtain root privileges on the system.

A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device and then execute those files on the underlying operating system as root.

This vulnerability is due a lack of file validation checks that would prevent uploaded files from being placed in privileged directories on an affected system. An attacker could exploit this vulnerability by uploading a crafted file to the affected device. A successful exploit could allow the attacker to store malicious files on the affected system and then execute arbitrary code or obtain root privileges on the system.

EPSS

Процентиль: 44%
0.00221
Низкий

10 Critical

CVSS3

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 10
nvd
8 месяцев назад

A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device and then execute those files on the underlying operating system as root. This vulnerability is due a lack of file validation checks that would prevent uploaded files from being placed in privileged directories on an affected system. An attacker could exploit this vulnerability by uploading a crafted file to the affected device. A successful exploit could allow the attacker to store malicious files on the affected system and then execute arbitrary code or obtain root privileges on the system.

CVSS3: 10
fstec
8 месяцев назад

Уязвимость частного прикладного программного интерфейса платформы управления политиками соединений Cisco Identity Services Engine (ISE), позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 44%
0.00221
Низкий

10 Critical

CVSS3

Дефекты

CWE-269