Zero Day Initiative - CVE-2025-20281: Cisco ISE API Unauthenticated Remote Code Execution Vulnerability
Briefly

The sudo command posed a significant command injection vulnerability executing code as root. Test inputs included serialized Java String[] objects. The endpoint /deployment-rpc/enableStrongSwanTunnel processed these inputs, where the first element was a command injection. For example, an input resulting in "configureStrongSwan.sh enable x; touch /flag" demonstrates the execution of malicious commands through the vulnerable endpoint. Logs captured by reconfiguring log4j to output debug logs provided insight into the executed commands without showing full requests.
The sudo command was identified as a command injection vulnerability that executes code as root, raising security concerns in the application.
Test inputs were sent to the endpoint, which logged requests using a serialized Java String[] array, including command injection payloads.
Read at Zero Day Initiative
[
|
]