First published: Fri May 23 2014(Updated: )
Cisco Identity Services Engine (ISE) 1.2(.1 patch 2) and earlier does not properly handle deadlock conditions during reception of crafted RADIUS accounting packets from multiple NAS devices, which allows remote authenticated users to cause a denial of service (RADIUS outage) by sourcing these packets from two origins, aka Bug ID CSCuo56780.
Credit: ykramarz@cisco.com psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | <=1.2 | |
Cisco Identity Services Engine | =1.0 | |
Cisco Identity Services Engine | =1.1 | |
<=1.2 | ||
=1.0 | ||
=1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3276 is classified as a denial of service vulnerability that can impact Cisco Identity Services Engine.
To fix CVE-2014-3276, upgrade to the latest version of Cisco Identity Services Engine that addresses this vulnerability.
CVE-2014-3276 affects users of Cisco Identity Services Engine versions 1.2 and earlier, including versions 1.0 and 1.1.
CVE-2014-3276 is a remote denial of service vulnerability caused by improper handling of crafted RADIUS accounting packets.
Yes, CVE-2014-3276 can be exploited remotely by authenticated users sending malicious RADIUS packets.