Exploit for Deserialization of Untrusted Data in Cisco Identity Services Engine
Discription

image
🗒️ How to use cve‑20124 (RCE): python3 Exploit.py –url https://ise.example.com –Session your_ISE_Session_Token –DESER-CMD "Touch /TMP /PWWNED" cve‑20125 (authorized bypass): ## python3 Exploit.py –url https://ise.example.com –Session your_ISE_Session_Token –Bbypass ⚠️ Important note Both drive require an ISE administrator to log in (the administrator only read is enough) This is only an example; In the actual you need: The Java utility chain is true to sequentially self -transparent CVE‑201224. Final score authentication (using assumption/API/V1/Admin/*). 🔍 Reference source Cisco ADVISORY CVE‑20124 & Cve‑20125 – Receive RCE level & ignore the required…Read More

Back to Main

Subscribe for the latest news: