A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper handling of certain RADIUS requests. An attacker could exploit this vulnerability by sending a specific authentication request to a network access device (NAD) that uses Cisco ISE for authentication, authorization, and accounting (AAA). A successful exploit could allow the attacker to cause Cisco ISE to reload.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-restart-ss-uf986G2Q | Vendor Advisory |
Configurations
History
11 Jul 2025, 15:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-restart-ss-uf986G2Q - Vendor Advisory | |
CPE | cpe:2.3:a:cisco:identity_services_engine:3.4.0:*:*:*:*:*:*:* | |
Summary |
|
|
First Time |
Cisco
Cisco identity Services Engine |
21 May 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-21 17:15
Updated : 2025-07-11 15:22
NVD link : CVE-2025-20152
Mitre link : CVE-2025-20152
CVE.ORG link : CVE-2025-20152
JSON object : View
Products Affected
cisco
- identity_services_engine
CWE
CWE-125
Out-of-bounds Read