Cisco patches critical flaw affecting Identity Services Engine
The networking giant has urged enterprises to update immediately
Cisco has issued patches for three vulnerabilities affecting its Identity Services Engine (ISE) and Customer Collaboration Platform (CCP) services.
The three flaws, tracked as CVE-2025-20286, CVE-2025-20130, and CVE-2025-20129, included critical vulnerability with a rating of 9.9/10 which also included a public proof of concept exploit.
Highest on the list priorities for customers was CVE-2025-20286, which was detailed as a ‘static credential vulnerability’ by the tech giant.
Primarily affecting ISE deployments in AWS, Azure, and Oracle Cloud Infrastructure (OCI), this could allow unauthorized parties to access sensitive data, execute “limited” administrative operations, and modify system configurations.
Cisco said this vulnerability arose because credentials are “improperly generated” when ISE is deployed on cloud platforms. This means that different ISE deployments share the same credentials.
“These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same,” the company said.
"An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports.”
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Cisco noted that a threat actor could only access affected ISE instances if the Primary Administration node is deployed in the cloud. On the other hand, if it’s deployed on-premises, there is no vulnerability.
The networking giant added that there are no workarounds that address this vulnerability, urging enterprises to patch immediately.
Two more Cisco flaws patched
The two other vulnerabilities patched by Cisco this week aren’t on the same scale in terms of severity, both recording a CVSS score of 4.9.
CVE-2025-20129 is a vulnerability affecting the web-based chat interface of Cisco’s Customer Collaboration Platform (CCP). This, the company explained, could allow an authenticated user to "persuade users to disclose sensitive data”.
“This vulnerability is due to improper sanitization of HTTP requests that are sent to the web-based chat interface,” Cisco said in an advisory.
Essentially, threat actors could exploit this flaw by sending specially crafted HTTP requests to the chat interface of a user on a vulnerable server.
“A successful exploit could allow the attacker to redirect chat traffic to a server that is under their control, resulting in sensitive information being redirected to the attacker.”
CVE-2025-20130, which also affects ISE and Cisco ISE Passive Identity Connector (ISE-PIC), could allow an attacker with admin privileges to upload files to a compromised device.
“This vulnerability is due to improper validation of the file copy function. An attacker could exploit this vulnerability by sending a crafted file upload request to a specific API endpoint,” the company said. “A successful exploit could allow the attacker to upload arbitrary files to an affected system.”

Ross Kelly is ITPro's News & Analysis Editor, responsible for leading the brand's news output and in-depth reporting on the latest stories from across the business technology landscape. Ross was previously a Staff Writer, during which time he developed a keen interest in cyber security, business leadership, and emerging technologies.
He graduated from Edinburgh Napier University in 2016 with a BA (Hons) in Journalism, and joined ITPro in 2022 after four years working in technology conference research.
For news pitches, you can contact Ross at ross.kelly@futurenet.com, or on Twitter and LinkedIn.
-
What is Microsoft Maia?Explainer Microsoft's in-house chip is planned to a core aspect of Microsoft Copilot and future Azure AI offerings
-
If Satya Nadella wants us to take AI seriously, let’s forget about mass adoption and start with a return on investment for those already using itOpinion If Satya Nadella wants us to take AI seriously, let's start with ROI for businesses
-
Cisco says Chinese hackers are exploiting an unpatched AsyncOS zero-day flaw – here's what we know so farNews The zero-day vulnerability affects Cisco's Secure Email Gateway and Secure Email and Web Manager appliances – here's what we know so far.
-
Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network AcademyNews The Salt Typhoon hacker group has targeted telecoms operators and US National Guard networks in recent years
-
Cisco ASA customers urged to take immediate action as NCSC, CISA issue critical vulnerability warningsNews Cisco customers are urged to upgrade and secure systems immediately
-
Cisco eyes network security gains for agentic AINews New network security updates aim to secure AI agents across enterprises
-
96% of businesses have low cyber-readiness, claims CiscoThe 2025 Cisco Cybersecurity Readiness Index shows a concerning number of businesses globally are unprepared for rising AI-related threats.
-
Cisco takes aim at AI security at RSAC with ServiceNow partnershipNews The companies claim Cisco AI Defense and ServiceNow SecOps will help address new challenges raised by AI
-
Cisco claims new smart switches provide next-level perimeter defenseNews Cisco’s ‘security everywhere’ mantra has just taken on new meaning with the launch of a series of smart network switches.
-
Cisco is jailbreaking AI models so you don’t have to worry about itNews Cisco's new AI Defense security solution helps organizations shore up LLM security by identifying potential flaws.