关联漏洞
描述
This script checks for the presence of the **CVE-2025-20281** vulnerability in Cisco Identity Services Engine (ISE) and ISE-PIC, which allows **unauthenticated remote code execution (RCE)** as root due to insufficient input validation in a specific API.
介绍
# CVE-2025-20281 - Cisco ISE RCE Vulnerability Checker
This script checks for the presence of the **CVE-2025-20281** vulnerability in Cisco Identity Services Engine (ISE) and ISE-PIC, which allows **unauthenticated remote code execution (RCE)** as root due to insufficient input validation in a specific API.
**This tool is intended for authorized security testing and educational purposes only. Do not use it against systems you do not own or have permission to test.**
## About the Vulnerability
**CVE-2025-20281** allows an **unauthenticated, remote attacker** to execute arbitrary commands as root on the underlying OS by submitting a specially crafted API request. The flaw is due to **improper validation of user-supplied input**.
- **Attack Vector:** Remote
- **Privileges Required:** None
- **Impact:** Remote Code Execution (root)
- **Affected Products:** Cisco ISE, Cisco ISE-PIC (specific versions)
## Features
- Sends a crafted payload to simulate code execution attempts
- Detects possible signs of vulnerability
- Simple command-line usage
- No authentication required
## Requirements
- Python 3.x
- `requests` library
Install via:
```bash
pip install requests
```
## Usage
```bash
python check_cve_2025_20281.py https://<TARGET-IP-OR-DOMAIN>
```
### Example:
```bash
python check_cve_2025_20281.py https://192.168.1.100
```
## Interpreting Results
- `[!!!] POSIBLE VULNERABILIDAD DETECTADA` — Exploit attempt likely succeeded or triggered a revealing response.
- `[*] Server responded with error` — Possible indicator of payload processing.
- `[-] No abnormal behavior detected` — Target may not be vulnerable or is patched.
## File Structure
```
.
├── check_cve_2025_20281.py
├── README.md
├── requirements.txt
└── .gitignore
```
## Disclaimer
This script is provided **as-is** for **research and professional pentesting**. The authors are not responsible for any misuse or damages caused by this tool.
## 🔗 References
- [Cisco Security Advisory for CVE-2025-20281](https://tools.cisco.com/security/center/)
- [MITRE CVE Record](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20281)
## 👨💻 Author
**Grupo Oruss** – — Joy Bassett (@Division81),
[https://www.grupooruss.com](https://www.grupooruss.com)
文件快照
[4.0K] /data/pocs/c4daf990050132b77ef216b16932e3806beb7308
├── [1.5K] check_cve_2025_20281.py
├── [2.3K] README.md
└── [ 17] requirements.txt
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。