Логотип exploitDog
bind:CVE-2025-20284
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-20284

Количество 3

Количество 3

nvd логотип

CVE-2025-20284

около 1 месяца назад

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root. This vulnerability is due to insufficient validation of user-supplied input. An attacker with valid credentials could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, the attacker must have valid high-privileged credentials.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-w5q9-32xf-9fxh

около 1 месяца назад

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root. This vulnerability is due to insufficient validation of user-supplied input. An attacker with valid credentials could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, the attacker must have valid high-privileged credentials.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2025-08725

около 1 месяца назад

Уязвимость платформы управления политиками соединений Cisco Identity Services Engine (ISE) и Cisco ISE Passive Identity Connector (ISE-PIC), существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольные команды с root-привилегиями

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-20284

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root. This vulnerability is due to insufficient validation of user-supplied input. An attacker with valid credentials could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, the attacker must have valid high-privileged credentials.

CVSS3: 6.5
0%
Низкий
около 1 месяца назад
github логотип
GHSA-w5q9-32xf-9fxh

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root. This vulnerability is due to insufficient validation of user-supplied input. An attacker with valid credentials could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, the attacker must have valid high-privileged credentials.

CVSS3: 6.5
0%
Низкий
около 1 месяца назад
fstec логотип
BDU:2025-08725

Уязвимость платформы управления политиками соединений Cisco Identity Services Engine (ISE) и Cisco ISE Passive Identity Connector (ISE-PIC), существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольные команды с root-привилегиями

CVSS3: 6.5
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу