Skip to content

Critical Vulnerabilities in Cisco ISE and PaperCut Software Demand Immediate Attention

Recent developments in cybersecurity have highlighted critical vulnerabilities affecting widely used software platforms. The US Cybersecurity and Infrastructure Security Agency (CISA) has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. Two of these vulnerabilities are found in Cisco Identity Services Engine (ISE) Software, a crucial network security policy management platform. These vulnerabilities, identified as CVE-2025-20281 and CVE-2025-20337, allow unauthenticated remote attackers to execute arbitrary code with root privileges on affected systems. The vulnerabilities impact multiple versions of Cisco ISE and ISE-PIC, with a CVSS3.1 score of 10, indicating their critical nature.

Cisco has released patches to address these vulnerabilities, and CISA has mandated remediation by August 18. Organizations using affected versions must apply these patches promptly to mitigate potential exploitation. The vulnerabilities were discovered by security researchers from the Trend Micro Zero Day Initiative and have been actively exploited in the wild, underscoring the urgency of addressing these issues.

Additionally, a high-severity cross-site request forgery (CSRF) vulnerability, CVE-2023-2533, has been identified in PaperCut Next Generation (NG) and Multi-Function (MF) print management software. This vulnerability poses significant risks to organizations relying on these solutions for managing printing, copying, scanning, and faxing operations across their networks. The inclusion of this vulnerability in CISA's KEV list highlights the need for immediate action to secure affected systems.

These developments emphasize the importance of staying vigilant and proactive in addressing emerging cybersecurity threats. Organizations are urged to review their security postures and implement necessary measures to protect their systems and data from potential exploitation.

Threats and Vulnerabilities

The vulnerabilities in Cisco Identity Services Engine (ISE) Software, CVE-2025-20281 and CVE-2025-20337, are due to insufficient validation of user-supplied input in specific APIs. Exploitation allows remote attackers to execute arbitrary code as root on affected systems, potentially leading to full system compromise. These vulnerabilities affect multiple versions of Cisco ISE and ISE-PIC, with no available workarounds other than applying the provided patches.

CVE-2023-2533 is a cross-site request forgery (CSRF) vulnerability affecting PaperCut NG and MF software. This vulnerability can be exploited by attackers to perform unauthorized actions on behalf of authenticated users, potentially leading to unauthorized access or data manipulation within the print management system. Organizations using these solutions should prioritize patching to prevent exploitation.

Client Impact

The identified vulnerabilities pose significant risks to organizations across various industries. Exploitation of the Cisco ISE vulnerabilities could lead to operational disruptions, unauthorized access to sensitive data, and potential financial losses due to system compromise. Similarly, the PaperCut CSRF vulnerability could result in unauthorized access to print management systems, leading to data breaches or operational inefficiencies.

From a compliance perspective, failure to address these vulnerabilities could result in regulatory challenges or penalties, particularly for organizations subject to data protection regulations. Ensuring timely remediation is crucial to maintaining compliance and protecting organizational reputation.

Mitigations

To mitigate the identified risks, organizations should take the following actions:

  1. Apply the latest patches released by Cisco for all affected versions of Cisco ISE and ISE-PIC immediately.
  2. Update PaperCut NG and MF software to the latest version that addresses the CSRF vulnerability.
  3. Conduct a thorough review of network security policies and access controls to ensure they align with current best practices.
  4. Implement robust monitoring and logging mechanisms to detect any signs of exploitation or unauthorized access.
  5. Educate employees about the importance of cybersecurity hygiene and the potential risks associated with these vulnerabilities.

By taking these steps, organizations can significantly reduce their exposure to these critical vulnerabilities. It is essential to remain vigilant and proactive in addressing emerging threats to safeguard systems and data effectively.

1898 & Co. Response

1898 & Co. is actively responding to the current threat landscape by offering specialized services designed to address emerging cybersecurity threats. Our team is focused on providing tailored solutions that help clients mitigate risks associated with critical vulnerabilities like those identified in Cisco ISE and PaperCut software.

We have updated our security protocols to incorporate the latest threat intelligence and best practices for vulnerability management. Our experts are collaborating with industry allies and government agencies to enhance our understanding of evolving threats and develop effective mitigation strategies.

Our ongoing research efforts are dedicated to identifying new attack vectors and developing innovative solutions to protect our clients' systems and data. We have successfully assisted numerous organizations in implementing robust security measures that address both current and emerging threats.

Sources

  1. Cisco Security Advisories for ISE Vulnerabilities
  2. CVE Details for CVE-2025-20281
  3. CVE Details for CVE-2025-20337