# Cisco ISE API 未经授权的远程代码执行漏洞
## 漏洞概述
Cisco ISE 和 Cisco ISE-PIC 的特定 API 中存在漏洞,此漏洞允许未经身份验证的远程攻击者在底层操作系统上以 root 权限执行任意代码。攻击者无需任何有效凭据即可利用此漏洞。
## 影响版本
未具体列出影响的具体版本。
## 漏洞细节
该漏洞是由于用户提供的输入验证不足导致的。攻击者可以通过提交精心构造的 API 请求来利用此漏洞。成功利用该漏洞可以允许攻击者在受影响设备上获得 root 权限。
## 影响
未经身份验证的远程攻击者可能获取 root 权限,对受影响设备进行完全控制。
                                        
                                    
                                | # | POC 描述 | 源链接 | 神龙链接 | 
|---|---|---|---|
| 1 | Unauthenticated Python PoC for CVE-2025-20281 RCE against ISE ERS API | https://github.com/abrewer251/CVE-2025-20281-2-Cisco-ISE-RCE | POC详情 | 
| 2 | This script checks for the presence of the **CVE-2025-20281** vulnerability in Cisco Identity Services Engine (ISE) and ISE-PIC, which allows **unauthenticated remote code execution (RCE)** as root due to insufficient input validation in a specific API. | https://github.com/grupooruss/CVE-2025-20281-Cisco | POC详情 | 
| 3 | Unauthenticated Remote Code Execution exploit for CVE-2025-20281 in Cisco ISE ERS API. Execute commands or launch reverse shells as root — no authentication required. | https://github.com/ill-deed/Cisco-CVE-2025-20281-illdeed | POC详情 | 
| 4 | CVE-2025-20281 | https://github.com/B1ack4sh/Blackash-CVE-2025-20281 | POC详情 | 
| 5 | A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-20281.yaml | POC详情 | 
标题: Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities -- 🔗来源链接
标签:
神龙速读暂无评论