CVE-2022-20756

A vulnerability in the RADIUS feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause the affected system to stop processing RADIUS packets. This vulnerability is due to improper handling of certain RADIUS requests. An attacker could exploit this vulnerability by attempting to authenticate to a network or a service where the access server is using Cisco ISE as the RADIUS server. A successful exploit could allow the attacker to cause Cisco ISE to stop processing RADIUS requests, causing authentication/authorization timeouts, which would then result in legitimate requests being denied access. Note: To recover the ability to process RADIUS packets, a manual restart of the affected Policy Service Node (PSN) is required. See the Details section for more information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch17:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch12:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch13:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch14:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch10:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.7.0.356:patch1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*

History

21 Nov 2024, 06:43

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-dos-JLh9TxBp - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-dos-JLh9TxBp - Vendor Advisory
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 8.6

14 Apr 2022, 15:32

Type Values Removed Values Added
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-dos-JLh9TxBp - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-dos-JLh9TxBp - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.2.0:patch17:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch14:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch10:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.7.0.356:patch1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch13:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:2.4.0:patch12:*:*:*:*:*:*

06 Apr 2022, 19:22

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-06 19:15

Updated : 2024-11-21 06:43


NVD link : CVE-2022-20756

Mitre link : CVE-2022-20756

CVE.ORG link : CVE-2022-20756


JSON object : View

Products Affected

cisco

  • identity_services_engine
CWE
CWE-399

Resource Management Errors

NVD-CWE-noinfo