
[CIVN-2025-0296] Multiple Vulnerabilities in CISCO
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in CISCO
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: MEDIUM
Systems Affected
Cisco ISE and Cisco ISE-PIC
Overview
Multiple vulnerabilities have been reported in the Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker to either disclose sensitive information or conduct a reflected cross-site scripting (XSS) attack.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC).
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
1. Cross-Site Script Vulnerability ( CVE-2025-20289 CVE-2025-20303 CVE-2025-20304 )
These vulnerabilities exist due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface.
Successful exploitation of these vulnerabilities could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
2. Information Disclosure Vulnerability
This vulnerability exists due to certain files lack proper data protection mechanisms. An attacker could exploit this vulnerability by performing actions where the results should only be viewable to a high-privileged user.
Successful exploitation of this vulnerability could allow the attacker to view passwords that are normally not visible to read-only administrators.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multiple-vulns-O9BESWJH
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multiple-vulns-O9BESWJH
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multiple-vulns-O9BESWJH
CVE Name
CVE-2025-20289
CVE-2025-20303
CVE-2025-20304
CVE-2025-20305
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=hhcy
—–END PGP SIGNATURE—–


