{"vulnerability": "CVE-2025-20124", "sightings": [{"uuid": "62b19df0-f935-42be-b594-ac651a7ab293", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://threatintel.cc/2025/02/06/critical-cisco-ise-vulnerabilities-patched.html", "content": "", "creation_timestamp": "2025-02-06T12:24:35.000000Z"}, {"uuid": "47a9a5d1-ff28-4eaa-9136-9c9aed573160", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://threatintel.cc/2025/02/07/ciscos-ise-bugs-could-allow.html", "content": "", "creation_timestamp": "2025-02-07T12:38:53.000000Z"}, {"uuid": "c8a76340-c552-4dee-a573-502740852df8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lhitlrcmdh27", "content": "", "creation_timestamp": "2025-02-06T10:05:59.596627Z"}, {"uuid": "228bfbb5-755a-4c7d-9058-e3e2df705822", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3lhiuc3heds2i", "content": "", "creation_timestamp": "2025-02-06T10:18:28.507134Z"}, {"uuid": "8bd11b1e-d63f-4da4-9d07-d9d3067dcf15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/youranonriots.bsky.social/post/3lhjvdb2l3k2z", "content": "", "creation_timestamp": "2025-02-06T20:09:42.411049Z"}, {"uuid": "b49e45f4-140a-4ac5-b500-ca2e4153a49f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lhjnbvplus2b", "content": "", "creation_timestamp": "2025-02-06T17:45:58.881298Z"}, {"uuid": "d43aeddd-082a-491c-8111-89b57d92034a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lhj7bqkfx42k", "content": "", "creation_timestamp": "2025-02-06T13:35:08.558234Z"}, {"uuid": "59bfd31e-a328-4431-83f2-d2dc3ca6747b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113952255128702135", "content": "", "creation_timestamp": "2025-02-05T16:37:05.531643Z"}, {"uuid": "76e2da8b-3c3e-4a97-9e98-a6ec8641e05b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lhi5rhh25k2h", "content": "", "creation_timestamp": "2025-02-06T03:35:32.285133Z"}, {"uuid": "0623c92c-8cd4-4203-84ed-77ec49aaadbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952194402567067", "content": "", "creation_timestamp": "2025-02-05T16:21:38.217339Z"}, {"uuid": "3efddf4e-36f9-4e7d-a09d-7703b27bab70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://thehackernews.com/2025/02/cisco-patches-critical-ise.html", "content": "", "creation_timestamp": "2025-02-06T06:40:00.000000Z"}, {"uuid": "3b9921b0-8799-4458-a3da-7af522a52029", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhh35fcirc2t", "content": "", "creation_timestamp": "2025-02-05T17:15:47.267516Z"}, {"uuid": "d1dbb621-ec80-4770-9024-e13a9ee517eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lhjhl6n4sy2h", "content": "", "creation_timestamp": "2025-02-06T16:03:34.958201Z"}, {"uuid": "9af3961b-d056-4bf3-b67d-81c0af988de4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhjpv6i5ul2o", "content": "", "creation_timestamp": "2025-02-06T18:32:19.521091Z"}, {"uuid": "60af0303-7c7b-4680-b164-312c2966463a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/113974226972149204", "content": "", "creation_timestamp": "2025-02-09T13:44:53.878085Z"}, {"uuid": "58b78c2c-09da-4cd4-8b18-42c180640f14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lhiivlvc4c2z", "content": "", "creation_timestamp": "2025-02-06T06:54:41.482990Z"}, {"uuid": "138bf1cb-4bed-404e-bfef-0d4861b2c360", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113952770877232105", "content": "", "creation_timestamp": "2025-02-05T18:48:14.940773Z"}, {"uuid": "b10aed6c-804f-42e4-bae8-15d3800597ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhhesoeubz2z", "content": "", "creation_timestamp": "2025-02-05T20:08:45.272349Z"}, {"uuid": "dd2e6f53-7727-41ee-814b-d83ca8a99f01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ls5h7ojr5e2o", "content": "", "creation_timestamp": "2025-06-21T21:02:28.010091Z"}, {"uuid": "bfc0a516-f0f5-411d-8c2a-fc626564d11e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lj4tvywfoo2m", "content": "", "creation_timestamp": "2025-02-27T02:30:09.312238Z"}, {"uuid": "be9d607b-b91f-4803-9106-95c9263ce776", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lw54pe3wcn2n", "content": "", "creation_timestamp": "2025-08-11T15:35:01.438709Z"}, {"uuid": "501369ac-c2c5-42d9-a13c-7bf1d21c52cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lw54pzjns22a", "content": "", "creation_timestamp": "2025-08-11T15:35:23.083755Z"}, {"uuid": "16eb4e8c-6627-4a72-8aca-288d1236ca48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "published-proof-of-concept", "source": "Telegram/wFoDPO2juTetScN1lMUJrga6MvbS0jfuEP5RLYRBlBKL1Xg", "content": "", "creation_timestamp": "2025-06-16T15:00:08.000000Z"}, {"uuid": "886e1d48-9dab-4ec8-ab23-9c031df47f46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwa7hpnbrb2p", "content": "", "creation_timestamp": "2025-08-12T21:02:29.261305Z"}, {"uuid": "f2c30e8e-1d14-49f0-9513-213b90ac994e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/47500", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aEsse script explora a vulnerabilidade CVE-2025-20124 \u2014 uma falha de Java Deserialization no Cisco ISE (Identity Services Engine) que permite Remote Code Execution (RCE).\nURL\uff1ahttps://github.com/137f/Cisco-ISE-3.0---Remote-Code-Execution-RCE-\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-12T22:35:48.000000Z"}, {"uuid": "957ecbd9-4651-4508-8ef3-be196dabaa54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://t.me/cvedetector/17311", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20124 - Cisco ISE Remote Code Execution (RCE) via Insecure Deserialization\", \n  \"Content\": \"CVE ID : CVE-2025-20124 \nPublished : Feb. 5, 2025, 5:15 p.m. | 49\u00a0minutes ago \nDescription : A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker to execute arbitrary commands as the root user on an affected device.  \n  \nThis vulnerability is due to insecure deserialization of user-supplied Java byte streams by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object to an affected API. A successful exploit could allow the attacker to execute arbitrary commands on the device and elevate privileges.  \nNote:\u00a0To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T19:09:20.000000Z"}, {"uuid": "f4def33c-7c82-4a8f-8148-c11bdd63b0f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "published-proof-of-concept", "source": "Telegram/qrqNXy-LFnDqpCptstXdyMweXak-lAcnoZbxdT5gTxXk4Dg", "content": "", "creation_timestamp": "2025-08-13T09:00:04.000000Z"}, {"uuid": "cb2f9a2d-42c9-48a0-b0b1-c252c27f55a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://t.me/CyberBulletin/2267", "content": "\u26a1CVE-2025-20124 (CVSS 9.9) &amp; CVE-2025-20125 (CVSS 9.1): Cisco Patches Critical Flaws in Identity Services Engine.\n\n#CyberBulletin", "creation_timestamp": "2025-02-06T12:53:55.000000Z"}, {"uuid": "17be83d6-0af3-4ea3-bfe7-34f14eb1b170", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/1008", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc API Cisco Identity Services Engine (ISE) \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0646\u0642\u0635 \u062f\u0631 \u0645\u06a9\u0627\u0646\u06cc\u0633\u0645 deserialization \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u062f\u0633\u062a\u0648\u0631\u0627\u062a \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0628\u0627 \u0627\u0631\u0633\u0627\u0644 \u06cc\u06a9 \u0634\u06cc \u062c\u0627\u0648\u0627 \u0633\u0627\u062e\u062a\u0647 \u0634\u062f\u0647 \u062e\u0627\u0635 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\nBDU: 2025-01234\nCVE-2025-20124\n\n\u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u06a9\u0647 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0647\u0627\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u06cc \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u06cc\u06a9 \u0644\u06cc\u0633\u062a \"\u0633\u0641\u06cc\u062f\" \u0627\u0632 \u0622\u062f\u0631\u0633 \u0647\u0627\u06cc IP \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 API.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc SIEM \u0628\u0631\u0627\u06cc \u0631\u062f\u06cc\u0627\u0628\u06cc \u062a\u0644\u0627\u0634 \u0647\u0627 \u0628\u0631\u0627\u06cc \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n\u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc \u0633\u0627\u0632\u0646\u062f\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u06cc\u062f:\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2025-02-08T17:14:15.000000Z"}, {"uuid": "e5d320c5-0186-410a-bcce-c8a3b5227e78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "Telegram/KEi_lKEtMjPOFRc2zONzU7Tg6JqTdI8xQl4JVMWuD74buA", "content": "", "creation_timestamp": "2025-02-06T11:55:31.000000Z"}, {"uuid": "7119932e-a0d5-4056-a991-54efb56eb4f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://t.me/true_secator/6705", "content": "Cisco \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430\u00a0\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Identity Services Engine (ISE), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438 \u043f\u043e\u0432\u044b\u0448\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445.\n\n\u041f\u0435\u0440\u0432\u0430\u044f CVE-2025-20124\u00a0(CVSS: 9,9) \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 Java \u0432 API Cisco ISE, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f root \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435.\n\n\u0414\u0440\u0443\u0433\u0430\u044f, CVE-2025-20125\u00a0(CVSS: 9,1), - \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 API Cisco ISE, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u0443\u0447\u0435\u0442\u043d\u044b\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e, \u0438\u0437\u043c\u0435\u043d\u0438\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0443\u0437\u043b\u0430 \u0438 \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0443\u0437\u0435\u043b.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043b\u044e\u0431\u0443\u044e \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0432 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043e\u0431\u044a\u0435\u043a\u0442 Java \u0438\u043b\u0438 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441 \u043d\u0430 \u043d\u0435\u0443\u043a\u0430\u0437\u0430\u043d\u043d\u0443\u044e \u043a\u043e\u043d\u0435\u0447\u043d\u0443\u044e \u0442\u043e\u0447\u043a\u0443 API, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u0442 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Cisco, \u043e\u0431\u0435 \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u0437\u0430\u0432\u0438\u0441\u044f\u0442 \u0434\u0440\u0443\u0433 \u043e\u0442 \u0434\u0440\u0443\u0433\u0430 \u0438 \u043d\u0435 \u0438\u043c\u0435\u044e\u0442 \u043e\u0431\u0445\u043e\u0434\u043d\u044b\u0445 \u043f\u0443\u0442\u0435\u0439 \u0434\u043b\u044f \u0438\u0445 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Deloitte \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0432 Cisco ISE 3.0 (\u043f\u0435\u0440\u0435\u0445\u043e\u0434 \u043d\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u0432\u0435\u0440\u0441\u0438\u044e), 3.1 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 3.1P10), 3.2 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 3.2P7), 3.3 (\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u0432 3.3P4) \u0438 3.4 (\u043d\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e).\n\n\u0414\u0430\u043d\u043d\u044b\u043c\u0438 \u043e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u043c \u0437\u043b\u043e\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Cisco \u043d\u0435 \u0440\u0430\u0441\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442, \u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b.", "creation_timestamp": "2025-02-06T12:58:07.000000Z"}, {"uuid": "f024202b-cdd1-4dde-a6d6-1d0eabb2247f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://t.me/thehackernews/6296", "content": "\ud83d\uded1 Cisco just patched two critical vulnerabilities in Identity Services Engine (ISE) that could allow attackers to execute arbitrary commands and escalate privileges remotely. \n\n\u26a0\ufe0f CVE-2025-20124 &amp; CVE-2025-20125 carry CVSS scores of 9.9 and 9.1.\n\nRead \u2014 https://thehackernews.com/2025/02/cisco-patches-critical-ise.html", "creation_timestamp": "2025-02-06T08:52:45.000000Z"}, {"uuid": "b102ab02-5659-47f5-83dc-4f5e5d800df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20124", "type": "seen", "source": "https://t.me/CybNux/7602", "content": "\u0642\u0627\u0645\u062a \u0634\u0631\u0643\u0629 Cisco \u0644\u0644\u062a\u0648 \u0628\u0625\u0635\u0644\u0627\u062d \u062b\u063a\u0631\u062a\u064a\u0646 \u062e\u0637\u064a\u0631\u062a\u064a\u0646 \u0641\u064a Identity Services Engine (ISE) \u0648\u0627\u0644\u062a\u064a \u0642\u062f \u062a\u0633\u0645\u062d \u0644\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0628\u062a\u0646\u0641\u064a\u0630 \u0623\u0648\u0627\u0645\u0631 \u0639\u0634\u0648\u0627\u0626\u064a\u0629 \u0648\u062a\u0635\u0639\u064a\u062f \u0627\u0644\u0627\u0645\u062a\u064a\u0627\u0632\u0627\u062a \u0639\u0646 \u0628\u0639\u062f.\n\n\u26a0\ufe0f CVE-2025-20124 \u0648 CVE-2025-20125 \u062a\u062d\u0645\u0644 \u062f\u0631\u062c\u0627\u062a CVSS 9.9  - 9.1\n\n#\u0623\u062e\u0628\u0627\u0631", "creation_timestamp": "2025-02-07T00:32:58.000000Z"}]}