CVE编号
CVE-2022-20756利用情况
暂无补丁情况
N/A披露时间
2022-04-07漏洞描述
A vulnerability in the RADIUS feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause the affected system to stop processing RADIUS packets. This vulnerability is due to improper handling of certain RADIUS requests. An attacker could exploit this vulnerability by attempting to authenticate to a network or a service where the access server is using Cisco ISE as the RADIUS server. A successful exploit could allow the attacker to cause Cisco ISE to stop processing RADIUS requests, causing authentication/authorization timeouts, which would then result in legitimate requests being denied access. Note: To recover the ability to process RADIUS packets, a manual restart of the affected Policy Service Node (PSN) is required. See the Details section for more information.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | identity_services_engine | 2.2.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | identity_services_engine | 2.4.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | identity_services_engine | 2.6.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | identity_services_engine | 2.7.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | identity_services_engine | 2.7.0.356 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | identity_services_engine | 3.0.0 | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | identity_services_engine | 3.1 | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 无
还没有评论,来说两句吧...