No Login? No Problem: Cisco Ise Flaw Gave Root Access Before Fix Arrived, Sayresearchers
Threat actors have actively exploited a newly patched vulnerability in Cisco’s Identity Services Engine (ISE) software since early July, weeks before the networking giant got around to issuing a fix.
That’s according to the Shadowserver Foundation, a nonprofit organization that scans and monitors the internet for exploitation. The company’s CEO, Piotr Kijewski, told The Register on Thursday that it had observed signs of exploitation “of what we believe is CVE-2025-20281 around July 5th.”
Kijewski added that the Shadowserver Foundation has observed a “few more exploitation attempts” since that time.
The bug in question, rated 10 out of 10 on the CVSS scale, is a remote code execution flaw that lurks in the web-based management interface of Identity Services Engine (ISE), Cisco’s network access control system.
If successfully exploited, it allows unauthenticated attackers to execute arbitrary commands with root privileges on vulnerable devices. That’s right: no login required, no special permissions – just instant admin-level access.
Cisco first flagged the vulnerability in an advisory on June 25, along with CVE-2025-20337 – another 10-out-of-10-rated flaw that, like its sibling, allows miscreants to run arbitrary commands as root. This was followed by the disclosure of a third critical vulnerability that is also rated a perfect 10, CVE-2025-20282, on July 16.
Cisco’s advisory has been tweaked to confirm that “some of the bugs” are being actively exploited, though this revelation comes almost a full three weeks after Shadowserver first clocked signs of cybercriminals messing with CVE-2025-2033 in the wild.
“In July 2025, the Cisco PSIRT became aware of attempted exploitation of some of these vulnerabilities in the wild,” the company said in the update published on July 21.
Cisco is keeping quiet on who’s behind the attacks or how widespread the exploitation is, and isn’t saying whether any data has been pilfered from hacker-hit corporate networks. The networking goliath also failed to respond to The Register‘s emails asking for more details.
Cisco has warned that there are no workarounds, so if you’re running a vulnerable setup, patching pronto is your only option. The company has also had to roll out souped-up fixes after earlier patches proved ineffective at keeping criminals out.
“Cisco continues to strongly recommend that customers upgrade to a fixed software release to remediate these vulnerabilities,” Cisco said at the time. ®
For those keeping score, this isn’t Cisco’s first brush with actively exploited vulns. Back in April, so-called “sophisticated” cyberspies were caught exploiting a zero-day in Cisco firewalls to snoop on global targets. ®
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.