First published: Mon May 22 2017(Updated: )
A vulnerability in the TCP throttling process for the GUI of the Cisco Identity Services Engine (ISE) 2.1(0.474) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device where the ISE GUI may fail to respond to new or established connection requests. The vulnerability is due to insufficient TCP rate limiting protection on the GUI. An attacker could exploit this vulnerability by sending the affected device a high rate of TCP connections to the GUI. An exploit could allow the attacker to cause the GUI to stop responding while the high rate of connections is in progress. Cisco Bug IDs: CSCvc81803.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine (ISE) | =2.1\(0.474\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6653 is categorized as a denial of service vulnerability, allowing attackers to affect the availability of the Cisco Identity Services Engine.
To mitigate CVE-2017-6653, upgrade the Cisco Identity Services Engine to a version that is not affected by this vulnerability.
CVE-2017-6653 specifically affects Cisco Identity Services Engine version 2.1(0.474).
CVE-2017-6653 allows an unauthenticated remote attacker to cause a denial of service condition on the affected device.
Yes, CVE-2017-6653 can prevent the Cisco Identity Services Engine GUI from responding to connections, impacting service availability.