{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-20130","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2024-10-10T19:15:13.212Z","datePublished":"2025-06-04T16:17:27.311Z","dateUpdated":"2025-06-23T20:27:53.961Z"},"containers":{"cna":{"title":"Cisco Identity Services Engine Access Control Bypass Vulnerability","metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"}}],"descriptions":[{"lang":"en","value":"A vulnerability in the API of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to upload files to an affected device.\r\n\r\nThis vulnerability is due to improper validation of the file copy function. An attacker could exploit this vulnerability by sending a crafted file upload request to a specific API endpoint. A successful exploit could allow the attacker to upload arbitrary files to an affected system."}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-P4M8vwXY","name":"cisco-sa-ise-file-upload-P4M8vwXY"}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory."}],"source":{"advisory":"cisco-sa-ise-file-upload-P4M8vwXY","discovery":"EXTERNAL","defects":["CSCwj33565"]},"problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Access Control","type":"cwe","cweId":"CWE-284"}]}],"affected":[{"vendor":"Cisco","product":"Cisco Identity Services Engine Software","versions":[{"version":"3.0.0","status":"affected"},{"version":"3.0.0 p1","status":"affected"},{"version":"3.0.0 p2","status":"affected"},{"version":"3.0.0 p3","status":"affected"},{"version":"3.1.0","status":"affected"},{"version":"3.0.0 p4","status":"affected"},{"version":"3.1.0 p1","status":"affected"},{"version":"3.0.0 p5","status":"affected"},{"version":"3.1.0 p3","status":"affected"},{"version":"3.1.0 p2","status":"affected"},{"version":"3.0.0 p6","status":"affected"},{"version":"3.2.0","status":"affected"},{"version":"3.1.0 p4","status":"affected"},{"version":"2.7.0 p8","status":"affected"},{"version":"3.1.0 p5","status":"affected"},{"version":"3.2.0 p1","status":"affected"},{"version":"3.0.0 p7","status":"affected"},{"version":"3.1.0 p6","status":"affected"},{"version":"3.2.0 p2","status":"affected"},{"version":"3.1.0 p7","status":"affected"},{"version":"3.3.0","status":"affected"},{"version":"3.2.0 p3","status":"affected"},{"version":"3.0.0 p8","status":"affected"},{"version":"3.2.0 p4","status":"affected"},{"version":"3.1.0 p8","status":"affected"},{"version":"3.2.0 p5","status":"affected"},{"version":"3.2.0 p6","status":"affected"},{"version":"3.1.0 p9","status":"affected"},{"version":"3.3 Patch 2","status":"affected"},{"version":"3.3 Patch 1","status":"affected"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2025-06-23T20:27:53.961Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-04T18:13:24.858171Z","id":"CVE-2025-20130","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-04T18:20:23.800Z"}}]}}