CVE-2025-20281 Cisco ISE API Unauthenticated Remote Code Exe... #1188
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
CVE-2025-20281: Unauthenticated Unsafe Deserialization in Cisco ISE
enableStrongSwanTunnel
APISummary
On January 25, 2025, ZDI received a report from Kentaro Kawane of an unauthenticated unsafe deserialization in Cisco Identity Services Engine (ISE)
enableStrongSwanTunnel
API (DescriptionRegistrationListener class), tracked asCVE-2025-20281
(ZDI-25-609) and later fully addressed byCVE-2025-20337
(ZDI-25-607).Vul...
🔧 Technical Details
An unauthenticated command injection arises from unsafe deserialization of a serialized Java
String[]
in Cisco ISE’senableStrongSwanTunnel
API, followed by execution ofconfigureStrongSwan.sh
viasudo
as root. Java 8’sRuntime.exec(String)
splits on whitespace viaStringTokenizer
, ignoring quotes, which breaks multi-argument payloads. By substituting spaces with Bash’s Internal Field Separator (${IFS}
)...🤖 Agent Actions
The repository has been updated with relevant technical insights extracted from the ZDI blog:
src/pentesting-web/command-injection.md
• Added a new subsection “Java Runtime.exec Tokenization & ${IFS} Bypass” explaining how Java’s tokenisation can be bypassed using
${IFS}
, complete with rationale and practical examples.• Integrated the ZDI blog link into an updated “## References” section.
src/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/docker-release_agent-cgroups-escape.md
• Expanded the References section with the Cisco ISE container-escape write-up while keeping prior references intact.
These additions capture:
• The Java
Runtime.exec
whitespace-tokenisation quirk and its exploitation.• Usage of
${IFS}
for r...✅ Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.