Year-End Learning Carnival: Get Free Courses and Up to 50% off on Career Booster Combos!
D H M S

Remote requests can crash the Cisco RADIUS server

Cisco has patched a defect that could crash the Remote Authentication Dial-In User Service (RADIUS) feature of its Identity Services Engine (ISE), preventing user logins.

Cisco said the vulnerability is rated as high due to improper handling of specific RADIUS requests. Attackers can exploit the vulnerability by attempting to authenticate with a Cisco ISE RADIUS server, which would crash it and stop the processing of further login requests.

Cisco ISE versions 2.6P5 and later, 2.7P2 and onwards, 3.0 and 3.1 are vulnerable, with fixed software releases are now available.

  • Users running Cisco’s TelePresence Video Communication Server are advised to patch against a vulnerability in its web-based management interface.
  • Cisco’s Expressway is also vulnerable, and users are advised to upgrade to software version 14.0.5.
  • Cisco also issued patched software for another high vulnerability, affecting its Ultra Cloud Core.
TOP
whatsapp