First published: Wed Sep 06 2023(Updated: )
A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause the affected system to stop processing RADIUS packets.This vulnerability is due to improper handling of certain RADIUS accounting
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine (ISE) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ise-radius-dos-W7cNn7gt is classified as high, as it can allow unauthenticated remote attackers to disrupt services.
To fix cisco-sa-ise-radius-dos-W7cNn7gt, update the Cisco Identity Services Engine to the latest patched version provided by Cisco.
The vulnerability cisco-sa-ise-radius-dos-W7cNn7gt affects the Cisco Identity Services Engine (ISE) specifically.
Yes, cisco-sa-ise-radius-dos-W7cNn7gt can be exploited by an unauthenticated remote attacker.
The potential impact of cisco-sa-ise-radius-dos-W7cNn7gt is a denial of service, causing the system to stop processing RADIUS packets.