Home
1
Hot News
2
Information Security
3
[TWCERT 分享資安情資] Cisco 旗下身分識別服務存在二個重大資安漏洞4
https://www.kjintelligent.com/en/ KJ Intelligent Corp.
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
KJ Intelligent launches AI SOC Solution https://www.kjintelligent.com/en/hot_514832.html KJ Intelligent launches AI SOC Solution 2025-07-18 2026-07-18
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_514832.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_514832.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2025-07-18 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_514832.html


【出處:台灣電腦緊急應變小組 TWCert】
Cisco 旗下身分識別服務引擎(Identity Services Engine,ISE)是一款基於身分的安
全管理平台,可從網路、使用者設備收集資訊,並在網路基礎設施中實施策略和制定監管決策。前日
Cisco發布重大資安漏洞公告(CVE-2025-20281,CVSS:9.8 和 CVE-2025-20282,CVSS:10.0)並釋出
更新版本。
【CVE-2025-20281,CVSS:9.8】
此漏洞存在於Cisco ISE 和 Cisco ISE-PIC的特定AP
I,攻擊者無需任何有效憑證即可利用此漏洞。允許未經身分驗證的遠端攻擊者以root身分在底層作
業系統上執行任意程式碼。
【CVE-2025-20282,CVSS:10.0】
此漏洞存在於Cisco ISE 和 Cisco
ISE-PIC的內部API,允許未經身分驗證的遠端攻擊者將任意檔案上傳至受影響的設備,以root身分在
底層作業系統執行檔案。
◎建議措施:
根據官方網站釋出解決方式進行修補:https://sec.cloudapps.cisco.com/security/c
enter/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
◎相關IOC資訊:
◎備註:
◎參考資料:
1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvi
sory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
2. https://nvd.nist.gov/vuln/detail/CVE-2025-20281
3. https://nvd.nist.gov/vuln/detail/CVE-2025-20282

Previous Back to List Next