{"id":14342,"date":"2025-06-27T01:32:45","date_gmt":"2025-06-27T01:32:45","guid":{"rendered":"https:\/\/newestek.com\/?p=14342"},"modified":"2025-06-27T01:32:45","modified_gmt":"2025-06-27T01:32:45","slug":"cisco-warns-of-critical-api-vulnerabilities-in-ise-and-ise-pic","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14342","title":{"rendered":"Cisco warns of critical API vulnerabilities in ISE and ISE-PIC"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>CSOs are being urged to quickly patch multiple vulnerabilities in Cisco Systems Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) that could allow an unauthenticated, remote attacker to issue commands on the underlying operating system as the\u00a0<em>root\u00a0<\/em>user.<\/p>\n<p>The fault behind both vulnerabilities: Holes in application programming interfaces (APIs).<\/p>\n<p>\u201cTake this vulnerability seriously,\u201d said Moses Frost, senior course instructor on cloud penetration testing at the SANS Institute. \u201cIn my experience assessing networks, I have found through testing that many lack essential patches and security hardening on their core network devices. I have seen Cisco ISE deployments where regular users can freely access all ports on ISE, including Administrative pages. Assume threat actors would also have lateral access from inside the network. Although this is not best practice from Cisco, many production deployments make these APIs accessible. If you are running ISE, patch this now.\u201d<\/p>\n<p>How big is the risk? Cisco ISE is often used as a wireless authentication system, Frost pointed out, which frequently includes guest network portals, and it\u2019s also likely integrated into Microsoft Active Directory as a highly trusted system. It is also used to authenticate access to the administration layers of routers, switches, firewalls, and other network devices \u2014 and it can be used as a network access control (NAC) product.<\/p>\n<h2 class=\"wp-block-heading\" id=\"one-of-the-worst-ive-seen\">\u2018One of the worst I\u2019ve seen\u2019<\/h2>\n<p>\u201cThis is probably one of the worst [flaws] I have seen in terms of impact,\u201d said Kellman Meghu, principal security architect at DeepCove Cybersecurity. \u201cIt is a path for an unauthenticated, remote attacker to gain the highest-level privilege possible, so I am not even sure how it gets much worse that this, and then it does.\u201d<\/p>\n<p>\u201cThis is most serious for companies that are failing to perform the proper security hygiene,\u201d said Robert Beggs, CEO of Canadian incident response firm Digital Defence.<\/p>\n<p>By that he means those that don\u2019t have a hardware inventory that includes network components, who don\u2019t monitor vendor or media announcements of recent vulnerabilities, or who lack the licensing that facilitates system upgrades and patches.\u00a0<\/p>\n<p>Cisco has patches for these issues, but they aren\u2019t delivered automatically, he pointed out, and admins have to follow Cisco\u2019s process to obtain the patch.<\/p>\n<p>Because ISE is the gatekeeper for network access (wired, wireless, VPN, or guest access), he warned, root access will allow attackers to gain the credentials for full movement through all network segments.<\/p>\n<p>\u201cAt present, there are no reports that these are being exploited in the wild,\u201d he said in an email to CSO. \u201cHowever, they are zero-interaction\u00a0exploits, so it is possible for attacks to go undetected. Because there is no need to authenticate, it is critical to apply the patches as soon as possible, as exploits will likely be available soon \u2014 if they are not already in use.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"rated-critical\">Rated critical<\/h2>\n<p>The vulnerabilities \u2014 <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-ise-unauth-rce-ZAd2GnJ6\" target=\"_blank\" rel=\"noreferrer noopener\">rated by Cisco as critical <\/a>\u2014 are:<\/p>\n<ul class=\"wp-block-list\">\n<li>CVE-2025-20281 affects Cisco ISE and ISE-PIC releases 3.3 and later, regardless of device configuration. An attacker does not require any valid credentials to exploit this vulnerability.<br \/>This vulnerability in a specific API is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request and then gain\u00a0<em>root\u00a0<\/em>privileges on an affected device;<\/li>\n<li>CVE-2025-20282 affects only Cisco ISE and ISE-PIC Release 3.4, regardless of device configuration.<br \/>This API vulnerability is due a lack of file validation checks that would prevent uploaded files from being placed in privileged directories on an affected system. An attacker could exploit this vulnerability by uploading a crafted file to the device. A successful exploit could allow the attacker to store malicious files on the affected system and then execute arbitrary code or obtain\u00a0<em>root\u00a0<\/em>privileges on the system.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"no-workarounds\">No workarounds<\/h2>\n<p>Patches must be installed for both vulnerabilities; there are no workarounds.<\/p>\n<p>Furthermore, the vulnerabilities are not dependent on one another, Cisco stresses in its advisory. Exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other one.<\/p>\n<p>While APIs in general are great, said Frost, \u201cthe unfortunate part of them is that many of the standard Web application vulnerabilities also apply. What is actually worse than that is that the bugs we had 10 or more years ago, which were solved by frameworks, are all reappearing in APIs.\u201d<\/p>\n<p>He added, \u201cIf I were running a development team around this today, I would look back at older OWASP bugs [identified by the Open Web Application Security Project] to ensure that certain bug classes that had been eliminated, such as vulnerabilities related to unauthenticated endpoints or mass assignment issues, are still addressed.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"common-api-vulnerabilities\">Common API vulnerabilities<\/h2>\n<p>As a key way of linking applications and sharing data, APIs are a vital part of mobile, SaaS, and web applications. As <a href=\"https:\/\/owasp.org\/www-project-api-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">OWASP notes<\/a>, by nature, APIs expose application logic and sensitive data such as personally identifiable information (PII), so are targets for threat actors if they aren\u2019t written with secure code. OWASP\u2019s API Security Project outlines best practices for developers to avoid API problems like:<\/p>\n<ul class=\"wp-block-list\">\n<li>broken object level authorization. To prevent this, object level authorization checks should be considered in every function that accesses a data source using an ID from the user;<\/li>\n<li>broken authorization due to incorrectly implemented authorization mechanisms. This allows attackers to compromise authentication tokens or to exploit implementation flaws to assume other users\u2019 identities. CSOs should make sure developers know all the possible flows to authenticate to the API.<br \/>API keys should not be used for user authentication, stresses OWASP. They should only be used for API clients authentication. OAuth is not authentication, OWASP adds, and neither are API keys;<\/li>\n<li>unrestricted resource consumption of APIs, which can lead to denial of service attacks;<\/li>\n<li>unrestricted access to sensitive business flows;<\/li>\n<li>server side request forgery (SSRF), caused by an API fetching a remote resource without validating the user supplied URI (uniform resource identifier). This enables an attacker to coerce the application to send a crafted request to an unexpected destination, even when protected by a firewall or a VPN;<\/li>\n<li>security misconfigurations. APIs and the systems supporting them typically contain complex configurations. That, says OWASP, is meant to make the APIs more customizable. However, software and DevOps engineers can miss these configurations, or don\u2019t follow security best practices when it comes to configuration, opening the door for different types of attacks.\u00a0<\/li>\n<\/ul>\n<p>OWASP says the API life cycle should include a repeatable hardening process leading to fast and easy deployment of a properly locked down environment; a task to review and update configurations across the entire API stack. The review should include: orchestration files, API components, and cloud services (for example, S3 bucket permissions); and an automated process to continuously assess the effectiveness of the configuration and settings in all environments.<\/p>\n<p>In addition, application development leaders should ensure that all API communications from the client to the API server and any downstream\/upstream components happen over an encrypted communication channel (TLS), regardless of whether it is an internal or public-facing API.<\/p>\n<p>For more advice to CSOs on securing API operations, check out <a href=\"https:\/\/www.csoonline.com\/article\/4011384\/the-cisos-5-step-guide-to-securing-ai-operations.html?utm=hybrid_search\" target=\"_blank\">The CISO\u2019s 5-step guide to securing AI operations<\/a>.<\/p>\n<p>And those thinking AI-generated code will be safer may find that they actually are more likely to expose API keys and other secrets,<a href=\"https:\/\/www.csoonline.com\/article\/3953927\/ai-programming-copilots-are-worsening-code-security-and-leaking-more-secrets.html\" target=\"_blank\">\u00a0according to this study.<\/a><\/p>\n<h2 class=\"wp-block-heading\" id=\"multiple-layer-of-defense-needed\">Multiple layer of defense needed<\/h2>\n<p>As cooler and slicker automations are added to existing IT systems, coding\u00a0errors are inevitable, Meghu noted.<\/p>\n<p>For defense, CSOs should ensure their networks use multiple layers of validation whenever possible, he said, for example, a web application firewall (WAF) that inspects and only allows API calls from specific sources. But, he added, these protections can be impaired as partners introduce more and more third\u00a0party SaaS services \u201cand all the API goodness that comes with it.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>CSOs are being urged to quickly patch multiple vulnerabilities in Cisco Systems Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) that could allow an unauthenticated, remote attacker to issue commands on the underlying operating system as the\u00a0root\u00a0user. The fault behind both vulnerabilities: Holes in application programming interfaces (APIs). \u201cTake this vulnerability seriously,\u201d said Moses Frost, senior course instructor on cloud penetration testing&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14342\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14342","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14342"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14342\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}