9.9

CVE-2025-20286

Medienbericht

A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.

This vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. A successful exploit could allow the attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.
Note: If the Primary Administration node is deployed in the cloud, then Cisco ISE is affected by this vulnerability. If the Primary Administration node is on-premises, then it is not affected.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
Produkt Cisco Identity Services Engine Software
Default Statusunknown
Version 3.1.0
Status affected
Version 3.1.0 p1
Status affected
Version 3.1.0 p3
Status affected
Version 3.1.0 p2
Status affected
Version 3.2.0
Status affected
Version 3.1.0 p4
Status affected
Version 3.1.0 p5
Status affected
Version 3.2.0 p1
Status affected
Version 3.1.0 p6
Status affected
Version 3.2.0 p2
Status affected
Version 3.1.0 p7
Status affected
Version 3.3.0
Status affected
Version 3.2.0 p3
Status affected
Version 3.2.0 p4
Status affected
Version 3.1.0 p8
Status affected
Version 3.2.0 p5
Status affected
Version 3.2.0 p6
Status affected
Version 3.1.0 p9
Status affected
Version 3.3 Patch 2
Status affected
Version 3.3 Patch 1
Status affected
Version 3.3 Patch 3
Status affected
Version 3.4.0
Status affected
Version 3.2.0 p7
Status affected
Version 3.3 Patch 4
Status affected
Version 3.4 Patch 1
Status affected
Version 3.1.0 p10
Status affected
Version 3.3 Patch 5
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.155
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 9.9 3.9 5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H
CWE-259 Use of Hard-coded Password

The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.