CVE-2025-20305
BaseFortify
Publication date: 2025-11-05
Last updated on: 2025-11-19
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | identity_services_engine | to 3.1.0 (inc) |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.2.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.3.0 |
| cisco | identity_services_engine | 3.4.0 |
| cisco | identity_services_engine | 3.4.0 |
| cisco | identity_services_engine | 3.4.0 |
| cisco | identity_services_engine | 3.4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1220 | The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the web-based management interface of Cisco ISE allows an authenticated remote attacker with read-only Administrator privileges to access sensitive information. It occurs because certain files do not have proper data protection, enabling the attacker to view passwords that should normally be hidden from users with read-only access.
How can this vulnerability impact me? :
The vulnerability could allow an attacker with limited privileges to obtain sensitive information such as passwords that are normally restricted. This could lead to unauthorized access or further exploitation of the affected device or network.