
[CIVN-2025-0295] Denial of Service Vulnerability in CISCO
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Denial of Service Vulnerability in CISCO
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Systems Affected
Cisco ISE releases 3.4.0, 3.4 Patch 1, 3.4 Patch 2, and 3.4 Patch 3
Overview
A vulnerability has been reported in the RADIUS setting Reject RADIUS requests from clients with repeated failures on Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause Cisco ISE to restart unexpectedly.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating in Cisco Identity Services Engine (ISE).
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
This vulnerability exists due to a logic error when processing a RADIUS access request for a MAC address that is already a rejected endpoint. An attacker could exploit this vulnerability by sending a specific sequence of multiple crafted RADIUS access request messages to Cisco ISE.
Successful exploitation of this vulnerability could allow the attacker to cause a denial of service (DoS) condition when Cisco ISE restarts.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-radsupress-dos-8YF3JThh
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-radsupress-dos-8YF3JThh
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-radsupress-dos-8YF3JThh
CVE Name
CVE-2025-20343
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmkN8EkACgkQ3jCgcSdc
ys80BQ//S2/AeAps0wIxurKJDpxCdrRMORq7zrqAAIM7IrozCoMPzz1jx0MxXREB
hYoVfKwqpuU1+7yp4JSbXNTQ0Gq5A9Qy2oslZmq1soWplibG3uQwFC0yDPIlKjMV
4B/KYg6yJnFLTsvMNzN2xfhoGpgCk51qoDWF6HWV52T3Ksu9oFyucpizFpAItZUN
MFa0+TIC4fogw4l836d8B7RVYTnVGSx947tJEwTOqZe2l6qrx3LQTYI592qwM5m6
W9n3Czer+0rhEYAV4kTj7i41fncUyfhQU1uNWASdBRKdpJc+SV+L74gFfPqjIjSZ
qPD2Q+PfgONWw0mR0R25Tui7QlO9yqjzil3luonzxldJbK9NrL/8c7FKqTdAdZ45
tW+x+hxKiOdjha2JLSJQXVx89a7IeYsMBctqEn7plqS2SsaPpy+4eAU0M19s66vW
9QxeDYhPZrsEBb5gOWxk9GenEtvs+bBsfGZrtgEk1gUdlmREFQL25k31igra+Fa3
vHXKMQq26TrGxMKLsWkQ9zTZuonJgpreGEtua1xqHgAnfEMXmtlSx3PTIBo/b5PI
VNVhSsTTI461bnzQjYHZ/tZzJzSTwYhwV+Ft77znRMj/32Rq4pDgDD2JLiNycMSU
xnGYoNpe078NgiU0zf4yicZ0kR6SFFIDcGZ0hlTUhQvlAVr7mp4=
=PS5T
—–END PGP SIGNATURE—–


