Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities
Cisco on Wednesday published 10 security advisories detailing over a dozen vulnerabilities across its products, including two high-severity flaws in its Identity Services Engine (ISE) and Unified Intelligence Center.
The ISE bug, tracked as CVE-2025-20152, impacts the RADIUS message processing feature and could be exploited remotely, without authentication, to cause ISE to reload, leading to a denial of service (DoS) condition.
“This vulnerability is due to improper handling of certain RADIUS requests. An attacker could exploit this vulnerability by sending a specific authentication request to a network access device (NAD) that uses Cisco ISE for authentication, authorization, and accounting (AAA),” Cisco notes in its advisory.
The networking giant also resolved a high-severity issue in Unified Intelligence Center, tracked as CVE-2025-20113, that could allow an authenticated attacker to elevate their privileges to those of an administrator, for a limited set of functions on a vulnerable system.
“This vulnerability is due to insufficient server-side validation of user-supplied parameters in API or HTTP requests. An attacker could exploit this vulnerability by submitting a crafted API or HTTP request to an affected system,” Cisco explains.
The security defect was resolved alongside CVE-2025-20114, a medium-severity vulnerability that can be exploited for horizontal privilege escalation.
“This vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by submitting crafted API requests to an affected system to execute an insecure direct object reference attack,” the advisory notes.
Medium-severity bugs were also resolved in Webex, Webex Meetings, Secure Network Analytics Manager, Secure Network Analytics Virtual Manager, ISE, Duo, Unified Communications and Contact Center Solutions, and Unified Contact Center Enterprise (CCE).
Successful exploitation of the security flaws could lead to XSS attacks, manipulated cached HTTP responses, arbitrary command execution, fraudulent findings in analytics reports, arbitrary command injection, privilege escalation, and data tampering.
Cisco says it is not aware of any of these vulnerabilities being exploited in the wild. Additional information can be found on Cisco’s security advisories page.
Related: Cisco Patches 35 Vulnerabilities Across Several Products
Related: Cisco Confirms Some Products Impacted by Critical Erlang/OTP Flaw
Related: Vulnerabilities Patched in Atlassian, Cisco Products
Related:Vulnerabilities Expose Cisco Meraki and ECE Products to DoS Attacks
Source link