A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass the authorization mechanisms for specific administrative functions.
This vulnerability is due to insufficient authorization enforcement mechanisms for users created by SAML SSO integration with an external identity provider. An attacker could exploit this vulnerability by submitting a series of specific commands to an affected device. A successful exploit could allow the attacker to modify a limited number of system settings, including some that would result in a system restart. In single-node Cisco ISE deployments, devices that are not authenticated to the network will not be able to authenticate until the Cisco ISE system comes back online.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco identity Services Engine |
|
CPEs | cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch10:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.4.0:patch1:*:*:*:*:*:* |
|
Vendors & Products |
Cisco
Cisco identity Services Engine |
Thu, 26 Jun 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 25 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass the authorization mechanisms for specific administrative functions. This vulnerability is due to insufficient authorization enforcement mechanisms for users created by SAML SSO integration with an external identity provider. An attacker could exploit this vulnerability by submitting a series of specific commands to an affected device. A successful exploit could allow the attacker to modify a limited number of system settings, including some that would result in a system restart. In single-node Cisco ISE deployments, devices that are not authenticated to the network will not be able to authenticate until the Cisco ISE system comes back online. | |
Title | Cisco Identity Services Engine Authorization Bypass Vulnerability | |
Weaknesses | CWE-285 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisco
Published: 2025-06-25T16:11:42.274Z
Updated: 2025-06-26T19:53:19.444Z
Reserved: 2024-10-10T19:15:13.243Z
Link: CVE-2025-20264

Updated: 2025-06-26T19:53:13.280Z

Status : Analyzed
Published: 2025-06-25T16:15:25.833
Modified: 2025-07-08T14:53:22.550
Link: CVE-2025-20264

No data.