We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-20332

Cisco Identity Services Engine Authorization Bypass Vulnerability



Description

A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to modify parts of the configuration on an affected device. This vulnerability is due to the lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to modify descriptions of files on a specific page. To exploit this vulnerability, an attacker would need valid read-only Administrator credentials.

Reserved 2024-10-10 | Published 2025-08-06 | Updated 2025-08-06 | Assigner cisco


MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

Incorrect Authorization

Product status

Default status
unknown

3.1.0
affected

3.1.0 p1
affected

3.1.0 p3
affected

3.1.0 p2
affected

3.2.0
affected

3.1.0 p4
affected

2.7.0 p8
affected

3.1.0 p5
affected

3.2.0 p1
affected

3.1.0 p6
affected

3.2.0 p2
affected

3.1.0 p7
affected

3.3.0
affected

3.2.0 p3
affected

3.2.0 p4
affected

3.1.0 p8
affected

3.2.0 p5
affected

3.2.0 p6
affected

3.1.0 p9
affected

3.3 Patch 2
affected

3.3 Patch 1
affected

3.3 Patch 3
affected

3.4.0
affected

References

sec.cloudapps.cisco.com/...isco-sa-ise_xss_acc_cont-YsR4uT4U (cisco-sa-ise_xss_acc_cont-YsR4uT4U)

cve.org (CVE-2025-20332)

nvd.nist.gov (CVE-2025-20332)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-20332

Support options

Helpdesk Chat, Email, Knowledgebase