CVE-2025-20285 - Authentication Bypass by Assumed-Immutable Data

Severity

41%

Complexity

23%

Confidentiality

23%

A vulnerability in the IP Access Restriction feature of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to bypass configured IP access restrictions and log in to the device from a disallowed IP address. This vulnerability is due to improper enforcement of access controls that are configured using the IP Access Restriction feature. An attacker could exploit this vulnerability by logging in to the API from an unauthorized source IP address. A successful exploit could allow the attacker to gain access to the targeted device from an IP address that should have been restricted. To exploit this vulnerability, the attacker must have valid administrative credentials.

CVSS 3.1 Base Score 4.1. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N).

Demo Examples

Authentication Bypass by Assumed-Immutable Data

CWE-302

In the following example, an "authenticated" cookie is used to determine whether or not a user should be granted access to a system.


               
}
...

Of course, modifying the value of a cookie on the client-side is trivial, but many developers assume that cookies are essentially immutable.

Overview

First reported 1 week ago

2025-07-16 17:15:00

Last updated 4 days ago

2025-07-22 14:16:00

Affected Software

Cisco Identity Services Engine (ISE)

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.