{"id":"CVE-2025-20282","details":"A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to upload arbitrary files to an affected device and then execute those files on the underlying operating system as root.\r\n\r\nThis vulnerability is due a lack of file validation checks that would prevent uploaded files from being placed in privileged directories on an affected system. An attacker could exploit this vulnerability by uploading a crafted file to the affected device. A successful exploit could allow the attacker to store malicious files on the affected system and then execute arbitrary code or obtain root privileges on the system.","modified":"2026-05-04T08:49:06.549970Z","published":"2025-06-25T17:15:37.490Z","withdrawn":"2026-05-04T08:49:06.549970Z","references":[{"type":"ADVISORY","url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.4.0-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.0-patch1"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.0-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.0-patch1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-20282.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}