Cisco Identity Services Stored Cross-Site Scripting Vulnerability

๐Ÿšจ SEVERITY: MEDIUM โ€” CVSS 4.8 Security Advisory

TL;DR ๐Ÿ“Œ

  • A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious codeโ€ฆ
  • No fixed release listed yet; apply mitigations and monitor.
  • Workarounds are documented in the advisory.
  • CVEs: CVE-2025-20267.

What happened ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.

[]

Cisco Unified Communications Manager Static SSH Credentials Vulnerability

๐Ÿšจ SEVERITY: CRITICAL โ€” CVSS 10.0 Security Advisory

TL;DR ๐Ÿ“Œ

  • A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted. This vulnerability is due to the presence of static user credentials forโ€ฆ
  • No fixed release listed yet; apply mitigations and monitor.
  • Workarounds are documented in the advisory.
  • CVEs: CVE-2025-20309.

What happened ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted.

[]

Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability

๐Ÿšจ SEVERITY: MEDIUM โ€” CVSS 6.1 Security Advisory

TL;DR ๐Ÿ“Œ

  • A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface toโ€ฆ
  • No fixed release listed yet; apply mitigations and monitor.
  • Workarounds are documented in the advisory.
  • CVEs: CVE-2025-20310.

What happened ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.

[]

Cisco Spaces Connector Privilege Escalation Vulnerability

๐Ÿšจ SEVERITY: MEDIUM โ€” CVSS 6.0 Security Advisory

TL;DR ๐Ÿ“Œ

  • A vulnerability in Cisco Spaces Connector could allow an authenticated, local attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root. This vulnerability is due to insufficient restrictions during the execution of specific CLI commands. An attacker could exploit this vulnerability by logging in to the Cisco Spaces Connector CLI as the spacesadmin user andโ€ฆ
  • No fixed release listed yet; apply mitigations and monitor.
  • Workarounds are documented in the advisory.
  • CVEs: CVE-2025-20308.

What happened ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A vulnerability in Cisco Spaces Connector could allow an authenticated, local attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root.

[]

Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability

๐Ÿšจ SEVERITY: MEDIUM โ€” CVSS 4.8 Security Advisory

TL;DR ๐Ÿ“Œ

  • A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious codeโ€ฆ
  • No fixed release listed yet; apply mitigations and monitor.
  • Workarounds are documented in the advisory.
  • CVEs: CVE-2025-20307.

What happened ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.

[]

Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability

๐Ÿšจ SEVERITY: MEDIUM โ€” CVSS 5.8 Security Advisory

TL;DR ๐Ÿ“Œ

  • A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a server-side request forgery (SSRF) attack through an affected device. This vulnerability is due to improper input validation for specific HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successfulโ€ฆ
  • No fixed release listed yet; apply mitigations and monitor.
  • Workarounds are documented in the advisory.
  • CVEs: CVE-2025-20288.

What happened ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a server-side request forgery (SSRF) attack through an affected device.

[]

Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities

๐Ÿšจ SEVERITY: MEDIUM โ€” CVSS 6.5 Security Advisory

TL;DR ๐Ÿ“Œ

  • Multiple vulnerabilities in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker to issue commands on the underlying operating system as the root user and allow IP access filters to be bypassed. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. For moreโ€ฆ
  • No fixed release listed yet; apply mitigations and monitor.
  • Workarounds are documented in the advisory.
  • CVEs: CVE-2025-20284, CVE-2025-20283, CVE-2025-20285.

What happened ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.

[]

Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability

๐Ÿšจ SEVERITY: MEDIUM โ€” CVSS 4.3 Security Advisory

TL;DR ๐Ÿ“Œ

  • A vulnerability in a subset of REST APIs of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, low-privileged, remote attacker to conduct a blind SQL injection attack. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to an affected API. A successfulโ€ฆ
  • No fixed release listed yet; apply mitigations and monitor.
  • Workarounds are documented in the advisory.
  • CVEs: CVE-2025-20272.

What happened ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A vulnerability in a subset of REST APIs of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, low-privileged, remote attacker to conduct a blind SQL injection attack.

[]

Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability

๐Ÿšจ SEVERITY: MEDIUM โ€” CVSS 6.3 Security Advisory

TL;DR ๐Ÿ“Œ

Cisco Unified Intelligence Center (CUIC) contains an authenticated arbitrary file upload vulnerability (CVE-2025-20274). An attacker with valid Report Designer (or higher) credentials could upload files, potentially execute commands and escalate to root. Fixed software is available; there are no workarounds.

What happened ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Improper validation of files uploaded via the CUIC web management interface allows an authenticated remote attacker to upload arbitrary files. A successful exploit can store malicious files and execute arbitrary OS commands; Cisco raised the Security Impact Rating because an attacker could elevate privileges to root. Exploitation requires valid credentials with at least the Report Designer role. Cisco PSIRT is not aware of any public announcements or active malicious use.

[]

Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities

๐Ÿšจ SEVERITY: CRITICAL โ€” CVSS 10.0 Security Advisory

TL;DR ๐Ÿ“Œ

  • Multiple vulnerabilities in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an unauthenticated, remote attacker to issue commands on the underlying operating system as the root user. For more information about these vulnerabilities, see the Details ["#details"] section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workaroundsโ€ฆ
  • No fixed release listed yet; apply mitigations and monitor.
  • Workarounds are documented in the advisory.
  • CVEs: CVE-2025-20282, CVE-2025-20281, CVE-2025-20337.

What happened ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.

[]