Cisco Identity Services Engine Passive Identity Connector vulnerabilities
7 known vulnerabilities affecting cisco/identity_services_engine_passive_identity_connector.
Total CVEs
7
CISA KEV
2
actively exploited
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH3MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2025-20337CRITICALCVSS 10.0KEVv3.3.0v3.4.02025-07-16
CVE-2025-20337 [CRITICAL] CWE-74 CVE-2025-20337: A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, rem
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability.
This vulnerability is due to insufficient validation of user-supplied input. An att
nvd
CVE-2025-20284HIGHCVSS 7.2fixed in 3.3.0v3.3.0+1 more2025-07-16
CVE-2025-20284 [MEDIUM] CWE-74 CVE-2025-20284: A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remot
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root.
This vulnerability is due to insufficient validation of user-supplied input. An attacker with valid credentials could exploit this vulnerability by submitting a crafted A
nvd
CVE-2025-20283HIGHCVSS 7.2fixed in 3.3.0v3.3.0+1 more2025-07-16
CVE-2025-20283 [MEDIUM] CWE-74 CVE-2025-20283: A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remot
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root.
This vulnerability is due to insufficient validation of user-supplied input. An attacker with valid credentials could exploit this vulnerability by submitting a crafted A
nvd
CVE-2025-20285MEDIUMCVSS 4.1fixed in 3.3.0v3.3.0+1 more2025-07-16
CVE-2025-20285 [MEDIUM] CWE-302 CVE-2025-20285: A vulnerability in the IP Access Restriction feature of Cisco ISE and Cisco ISE-PIC could allow an a
A vulnerability in the IP Access Restriction feature of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to bypass configured IP access restrictions and log in to the device from a disallowed IP address.
This vulnerability is due to improper enforcement of access controls that are configured using the IP Access Restriction
nvd
CVE-2025-20281CRITICALCVSS 10.0KEVPoCv3.3.0v3.4.02025-06-25
CVE-2025-20281 [CRITICAL] CWE-74 CVE-2025-20281: A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, rem
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability.
This vulnerability is due to insufficient validation of user-supplied input. An att
nvd
CVE-2025-20282CRITICALCVSS 10.0v3.4.02025-06-25
CVE-2025-20282 [CRITICAL] CWE-269 CVE-2025-20282: A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, re
A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device and then execute those files on the underlying operating system as root.
This vulnerability is due a lack of file validation checks that would prevent uploaded files from being placed in
nvd
CVE-2025-20130HIGHCVSS 7.2fixed in 3.1.0v3.1.0+2 more2025-06-04
CVE-2025-20130 [MEDIUM] CWE-284 CVE-2025-20130: A vulnerability in the API of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Co
A vulnerability in the API of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to upload files to an affected device.
This vulnerability is due to improper validation of the file copy function. An attacker could exploit this vulnerabi
nvd