Jason Soroko, senior fellow at Sectigo, is extra fearful concerning the blast radius of a possible exploit. “ISE sits on the very fringe of belief for a lot of campus networks, and a breach can rewrite entry insurance policies, transfer endpoints between VLANs, and open pivots into each section,” he mentioned. “The weak API is usually reachable from broad inner deal with ranges, generally even visitor Wi-Fi, and ISE patching requires disruptive upkeep home windows.”
Energetic focusing on feels seemingly as a result of the issues (CVE-2025-20281) already attracted public proof-of-concept exploits and scan visitors inside days, Soroko added.
For extra safety, Barr recommends utilizing specialised API safety options that may detect and block anomalous API exercise in actual time, present endpoint-risk scoring, and cease automated scanning and payload supply.