Cisco has rolled out a new batch of security updates, addressing more than a dozen vulnerabilities across its product suite. Among the most critical are two high-severity issues found in the Identity Services Engine (ISE) and the Unified Intelligence Center—flaws that could open the door to denial-of-service attacks and unauthorized admin access.
The more severe of the two, identified as CVE-2025-20152, affects the RADIUS message processing function within Cisco ISE. If exploited, a remote attacker—without any prior access—could crash the system simply by sending a carefully crafted authentication request through a network access device. Cisco explained that the vulnerability stems from the way certain RADIUS requests are processed, leading to potential service disruption.
Meanwhile, the second high-severity flaw (CVE-2025-20113) targets the Unified Intelligence Center. This one is a privilege escalation issue that allows a user with valid credentials to perform limited administrative functions they normally shouldn’t have access to. The root cause? Inadequate server-side checks for parameters passed through APIs and HTTP requests. By exploiting this oversight, an attacker could manipulate those requests to gain elevated permissions.
Cisco also resolved a related medium-severity issue (CVE-2025-20114) in the Intelligence Center. This bug allows lateral privilege escalation by abusing insecure direct object references—again due to insufficient validation in API inputs.
The company’s advisory didn’t stop there. It listed several additional medium-severity vulnerabilities across key platforms, including Webex, Secure Network Analytics Manager, Duo, and Unified Communications systems. These issues range from cross-site scripting (XSS) and cached HTTP response manipulation to arbitrary command execution and analytics report tampering.
Though these flaws are serious, Cisco has confirmed it hasn’t seen any signs of active exploitation. Still, it’s urging customers to apply the patches immediately. Full details and remediation guidance are available through Cisco’s official security advisories portal.