9.9
CVE-2025-20286
- EPSS 0.05%
- Published 04.06.2025 16:18:30
- Last modified 15.10.2025 17:58:47
- Source psirt@cisco.com
- CVE-Watchlists
- Open
A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems. This vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. A successful exploit could allow the attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems. Note: If the Primary Administration node is deployed in the cloud, then Cisco ISE is affected by this vulnerability. If the Primary Administration node is on-premises, then it is not affected.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Identity Services Engine Version3.1.0 Update-
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch10
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch3
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch4
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch5
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch6
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch7
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch8
Cisco ≫ Identity Services Engine Version3.1.0 Updatepatch9
Cisco ≫ Identity Services Engine Version3.2.0 Update-
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch3
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch4
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch5
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch6
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch7
Cisco ≫ Identity Services Engine Version3.3.0
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch3
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch4
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch5
Cisco ≫ Identity Services Engine Version3.4.0
Cisco ≫ Identity Services Engine Version3.4.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.2.0 Update-
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch3
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch4
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch5
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch6
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch7
Cisco ≫ Identity Services Engine Version3.3.0
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch3
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch4
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch5
Cisco ≫ Identity Services Engine Version3.4.0
Cisco ≫ Identity Services Engine Version3.4.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.2.0 Update-
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch3
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch4
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch5
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch6
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch7
Cisco ≫ Identity Services Engine Version3.3.0
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch3
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch4
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch5
Cisco ≫ Identity Services Engine Version3.4.0
Cisco ≫ Identity Services Engine Version3.4.0 Updatepatch1
| Type | Source | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.148 |
| Source | Base Score | Exploit Score | Impact Score | Vector string |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| psirt@cisco.com | 9.9 | 3.9 | 5.3 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H
|
CWE-259 Use of Hard-coded Password
The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.