CVE-2025-20281

CRITICAL

CVSS v3

10

CRITICAL

EPSS Score

36.0%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges

Technical Details

CVSS v3 Vector
3.1
Published
6/25/2025
Last Modified
10/28/2025

Frequently Asked Questions

What is CVE-2025-20281?

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges

Is CVE-2025-20281 actively exploited?

Active exploitation of CVE-2025-20281 has not been confirmed. The EPSS score is 36.0%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-20281?

CVE-2025-20281 has a CVSS v3 base score of 10 (CRITICAL severity), with vector string 3.1.

Is CVE-2025-20281 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.