Vulnslist

find the latest Cisco vulnerabilities

Cisco Identity Services Engine RADIUS Suppression Denial of Service Vulnerability

cisco-sa-ise-radsupress-dos-8YF3JThh · High · Published · Updated

A vulnerability in the RADIUS setting Reject RADIUS requests from clients with repeated failures on Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause Cisco ISE to restart unexpectedly. This vulnerability is due to a logic error when processing a RADIUS access request for a MAC address that is already a rejected endpoint. An attacker could exploit this vulnerability by sending a specific sequence of multiple crafted RADIUS access request messages to Cisco ISE. A successful exploit could allow the attacker to cause a denial of service (DoS) condition when Cisco ISE restarts. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-radsupress-dos-8YF3JThh

Workarounds

Cisco ISE devices are affected by this vulnerability only if Reject RADIUS requests from clients with repeated failures is configured.

As a workaround, administrators can disable this setting using the following steps:

Choose Administration > System > Settings > Protocols > RADIUS.
Navigate to the Suppress Repeated Failed Clients and repeated accounting section.
Uncheck only the Reject RADIUS requests from clients with repeated failures check box.

This setting is enabled by default and will be configured in most environments. If this configuration setting is disabled, the Cisco ISE device is not affected by this vulnerability. However, Cisco recommends re-enabling this configuration setting once the device has been upgraded to the fixed code.

For more information on this feature, which is new in Cisco ISE Release 3.4.0, see RADIUS Settings https://www.cisco.com/c/en/us/td/docs/security/ise/3-4/admin_guide/b_ise_admin_3_4/b_ISE_admin_segmentation.html#t_security_settings_33 in the Cisco Identity Services Engine Administrator Guide, Release 3.4.

While this workaround has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2025-20343
Cisco Bug IDsCSCwq27605
CVSS ScoreBase 8.6
Base 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Identity Services Engine Software

Related Products

Product CVE Evidence