Cisco has patched a defect that could crash the Remote Authentication Dial-In User Service (RADIUS) feature of its Identity Services Engine (ISE), preventing user logins.
Cisco said the vulnerability is rated as high due to improper handling of specific RADIUS requests. Attackers can exploit the vulnerability by attempting to authenticate with a Cisco ISE RADIUS server, which would crash it and stop the processing of further login requests.
Cisco ISE versions 2.6P5 and later, 2.7P2 and onwards, 3.0 and 3.1 are vulnerable, with fixed software releases are now available.