轉發 台灣電腦網路危機處理暨協調中心 TWCERTCC-200-202507-00000012
[內容說明]
Cisco 旗下身分識別服務引擎(Identity Services Engine,ISE)是一款基於身分的安全管理平台,可從網路、使用者設備收集資訊,並在網路基礎設施中實施策略和制定監管決策。Cisco發布重大資安漏洞公告(CVE-2025-20337,CVSS:10.0)並釋出更新版本,此漏洞存在於Cisco ISE 和 Cisco ISE-PIC的特定API,攻擊者無需任何有效憑證即可利用此漏洞,允許未經身分驗證的遠端攻擊者以root身分在底層作業系統上執行任意程式碼。
[影響平台]
Cisco ISE 和 ISE-PIC 3.3、3.4版本
[建議措施]
根據官方網站釋出解決方式進行修補:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
[參考資料]
https://www.twcert.org.tw/tw/cp-169-10251-d9034-1.html
Forwarded by Taiwan Computer Crisis and Coordination Center TWCERTCC-200-202507-00000012
[Content Description]
Cisco's Identity Services Engine (ISE) is an identity-based security management platform that collects information from the network and user devices, and implements policies and makes regulatory decisions in the network infrastructure. Cisco released a major security vulnerability announcement (CVE-2025-20337, CVSS: 10.0) and released an updated version. This vulnerability exists in a specific API of Cisco ISE and Cisco ISE-PIC. Attackers can exploit this vulnerability without any valid credentials, allowing unauthenticated remote attackers to execute arbitrary code on the underlying operating system as root.
[Influence Platform]
Cisco ISE and ISE-PIC 3.3, 3.4
[Suggested measures]
Follow the official website to release the solution and patch: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
[References]
https://www.twcert.org.tw/tw/cp-169-10251-d9034-1.html