9.1
CVE-2025-20125
- EPSS 0.18%
- Published 05.02.2025 17:15:22
- Last modified 28.03.2025 13:37:16
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node. This vulnerability is due to a lack of authorization in a specific API and improper validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to attacker to obtain information, modify system configuration, and reload the device. Note: To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Identity Services Engine Version < 3.1
Cisco ≫ Identity Services Engine Version3.1.0 Update-
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch3
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch4
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch5
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch6
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch7
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch8
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch9
Cisco ≫ Identity Services Engine Version3.2.0 Update-
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch3
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch4
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch5
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch6
Cisco ≫ Identity Services Engine Version3.3.0 Update-
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.18% | 0.401 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
psirt@cisco.com | 9.1 | 3.1 | 5.3 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H
|
CWE-285 Improper Authorization
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-862 Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.