9.9
CVE-2025-20286
- EPSS 0.05%
- Veröffentlicht 04.06.2025 16:18:30
- Zuletzt bearbeitet 05.06.2025 20:12:23
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems. This vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. A successful exploit could allow the attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems. Note: If the Primary Administration node is deployed in the cloud, then Cisco ISE is affected by this vulnerability. If the Primary Administration node is on-premises, then it is not affected.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
≫
Produkt
Cisco Identity Services Engine Software
Default Statusunknown
Version
3.1.0
Status
affected
Version
3.1.0 p1
Status
affected
Version
3.1.0 p3
Status
affected
Version
3.1.0 p2
Status
affected
Version
3.2.0
Status
affected
Version
3.1.0 p4
Status
affected
Version
3.1.0 p5
Status
affected
Version
3.2.0 p1
Status
affected
Version
3.1.0 p6
Status
affected
Version
3.2.0 p2
Status
affected
Version
3.1.0 p7
Status
affected
Version
3.3.0
Status
affected
Version
3.2.0 p3
Status
affected
Version
3.2.0 p4
Status
affected
Version
3.1.0 p8
Status
affected
Version
3.2.0 p5
Status
affected
Version
3.2.0 p6
Status
affected
Version
3.1.0 p9
Status
affected
Version
3.3 Patch 2
Status
affected
Version
3.3 Patch 1
Status
affected
Version
3.3 Patch 3
Status
affected
Version
3.4.0
Status
affected
Version
3.2.0 p7
Status
affected
Version
3.3 Patch 4
Status
affected
Version
3.4 Patch 1
Status
affected
Version
3.1.0 p10
Status
affected
Version
3.3 Patch 5
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.155 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
psirt@cisco.com | 9.9 | 3.9 | 5.3 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H
|
CWE-259 Use of Hard-coded Password
The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.