Cisco Identity Services Engine Remote Code Execution Vulnerabilities
Multiple remote code execution vulnerabilities in Cisco Identity Services Engine allow an authenticated attacker with read-only admin credentials to execute arbitrary commands on the ISE operating system. Exploitation begins with a crafted HTTP request sent to an affected device, exploiting insufficient input validation. Successful compromise allows the attacker to gain user-level access and escalate to root. In single-node deployments, this can cause a denial of service condition that prevents unauthenticated endpoints from accessing the network until the ISE node is restored.
- Valid read-only admin credentials for ISE
- Network access to ISE web interface (typically port 443)
- Ability to authenticate to ISE
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c9b1625a-33ea-4bbc-9eec-0e974d9388d4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.