支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: cc928677d3b402f5025f4366249e70397778ef21

来源
关联漏洞
标题:Cisco ISE和Cisco ISE-PIC 注入漏洞 (CVE-2025-20337)
描述:Cisco ISE和Cisco ISE-PIC都是美国思科(Cisco)公司的产品。Cisco ISE是一个 NAC 解决方案。用于管理零信任架构中的端点、用户和设备对网络资源的访问。Cisco ISE-PIC是一个组件。 Cisco ISE和Cisco ISE-PIC存在注入漏洞,该漏洞源于用户输入验证不足,可能导致未经验证的远程攻击者以root权限执行任意代码。
描述
CVE-2025-20337
介绍
# 🚨 **CVE-2025-20337: Critical Cisco ISE RCE Vulnerability** 🚨

![GwBxNM1X0AA2knL](https://github.com/user-attachments/assets/1d6aff7b-a85b-4061-8850-a76fe1ef8ee7)

Hey there! 👋 Let's dive into **CVE-2025-20337** – a **maximum severity (CVSS 10.0)** unauthenticated remote code execution (RCE) bug that's been **exploited in the wild** by attackers! 😱 This affects **Cisco Identity Services Engine (ISE)** and **ISE Passive Identity Connector (PIC)**. Time to **patch ASAP**! 🛡️

## 📋 **Quick Overview**
- **Severity**: **CRITICAL** (CVSS 10.0) 🔥
- **Published**: July 15, 2025 📅
- **Affected Products**: Cisco ISE (versions 3.1–3.4) & ISE-PIC ⚙️
- **Attack Vector**: Network (remote, no auth needed) 🌐
- **Impact**: Full **root access** – execute arbitrary commands! 💥
- **Exploited?**: **YES** – Active attacks reported since July 2025! ⚡

## 🐛 **What Went Wrong?**
Insufficient validation of user-supplied input in a **specific API endpoint**. Attackers send **malicious payloads** to trigger **deserialization flaws**, leading to **arbitrary code execution as root**. No login required! 🚪🔓

**Root Cause**: Tied to StrongSwan tunnel handling – untrusted data deserialization. 😤

## 🎯 **Affected Versions**
| Product       | Vulnerable Versions          | Fixed In                  |
|---------------|------------------------------|---------------------------|
| **Cisco ISE** | 3.1 – 3.3 Patch 6<br>3.4 Patch 0 | **3.3 Patch 7**<br>**3.4 Patch 2** |
| **ISE-PIC**   | All versions up to latest    | **Latest patches**        |

*Note*: Some **hot patches** (e.g., CSCwo99449) **DO NOT fix this** – upgrade fully! ❌➡️✅

## 🛡️ **How to Fix It – Step-by-Step**
1. **Upgrade Immediately**:
   - ISE: To **3.3 Patch 7** or **3.4 Patch 2** 📦
   - Download: [Cisco Software Download](https://software.cisco.com) 🔗
2. **Apply Patches**: Use CLI – `application upgrade <file>` 🛠️
3. **Verify**: Run `show version active` to confirm! ✅
4. **Interim**: Restrict API access via firewalls if upgrade delayed. 🧱
5. **Monitor Logs**: Watch for suspicious API calls! 👀

**Cisco Advisory**: [Full Details Here](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6) 📖

## 🌍 **Real-World Exploitation**
- **First Sightings**: July 2025 – APT groups targeting **identity systems**! 🕵️‍♂️
- **Paired Attacks**: Often with **CVE-2025-5777** (Citrix) for **full compromise**. 🔗
- **Amazon Alert**: Confirmed exploits granting **admin access**. (Nov 13, 2025) 🆕
- **CISA KEV**: Added to Known Exploited Vulnerabilities catalog! ⚠️

```
nuclei -t CVE-2025-20337.yaml -u https://your-ise.com -v
```

**Proof-of-Concept**: Available on GitHub (use ethically!) – [Nuclei Template](https://github.com/projectdiscovery/nuclei-templates/issues/12858) 🧪

## 📈 **Stats & Trends**
- **Exploits**: **High** – Hackers love unauth RCE! 📊
- **Mitigation Success**: Patched systems = **0% exploit rate**. 💪
- **Similar Bugs**: Part of 3-vuln cluster (CVE-2025-20281, -20282). 👥

## ❗ **Pro Tips to Stay Safe**
- **Always Patch First**: Delay = Danger! ⏰
- **Network Segmentation**: Isolate ISE from internet. 🛡️
- **SIEM Alerts**: Monitor for anomalous root commands. 🚨
- **Backup Before Upgrade**: Murphy's Law! 💾
- **Hunt for IOCs**: Check logs for API abuse. 🔍


---
文件快照

[4.0K] /data/pocs/cc928677d3b402f5025f4366249e70397778ef21 ├── [2.7K] CVE-2025-20337.yaml └── [3.4K] README.md 1 directory, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。