Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Anthropic CEO Dario Amodei calls OpenAI’s message about military agreement a ‘blatant lie,’ report says

Google settles with Epic Games, lowers Play Store fees to 20%

MacBook Neo, iPhone 17e, and everything else Apple announced this week

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Faults in Critical Cisco ISE authentication affect cloud deployments on AWS, Azure, and OCI
Identity

Faults in Critical Cisco ISE authentication affect cloud deployments on AWS, Azure, and OCI

userBy userJune 5, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 5th, 2025Ravi LakshmananNetwork Security/Vulnerabilities

Cisco ISE AUTH bypass defects

Cisco has released security patches to address critical security flaws affecting the Identity Services Engine (ISE).

The security flaw tracked as CVE-2025-20286 has a CVSS score of 9.9 out of 10.0. It is said to be a static credential vulnerability.

“Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments allow ruthless remote attackers to access sensitive data, perform restricted management operations, modify system configurations, and denies services within the system.”

The networking equipment manufacturer, who praised GMO Cybersecurity’s Kentaro Kawane for reporting the flaws, noted that they are aware of the existence of proof of concept (POC) exploits. There is no evidence that it was misused in the wild.

Cybersecurity

Cisco said the issue stems from the fact that when Cisco ISE is deployed on a cloud platform, the credentials are generated improperly, and different deployments share the same credentials as long as the software release and cloud platform are the same.

Put another way, static credentials are specific to each release and platform, but not valid across platforms. As the company emphasizes, all instances of Cisco ISE Release 3.1 on AWS have the same static credentials.

However, the credentials valid for accessing a Release 3.1 deployment are not valid for accessing a Release 3.2 deployment on the same platform. Additionally, AWS release 3.2 does not have the same credentials as Azure release 3.2.

The successful exploitation of the vulnerability allows an attacker to extract user credentials from a Cisco ISE cloud deployment and use it to access Cisco ISE deployed to other cloud environments through a specific port.

This ultimately allows for unauthorized access to sensitive data, perform limited administrative operations, modify system configuration, or disruption of services. That said, Cisco ISE is only affected if the primary management node is deployed in the cloud. Primary management nodes that are on-premises are not affected.

Cybersecurity

The following versions are affected –

AWS -Cisco ISE 3.1, 3.2, 3.3, and 3.4 Azure -Cisco ISE 3.2, 3.3, and 3.4 OCI -Cisco ISE 3.2, 3.3, and 3.4

Although there is no workaround to address CVE-2025-20286, Cisco recommends that users either restrict traffic to certified administrators or run the “Application Reset Configuration ISE” command to reset the user password to the new value. However, it has been pointed out that running the command will reset Cisco ISE to its factory configuration.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAlphabet CEO Sundar Pichai dismisses the fear of AI work and highlights expansion plans
Next Article How BioReCer is transforming certification standards across Europe
user
  • Website

Related Posts

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

March 4, 2026

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

March 4, 2026

New RFP template for AI usage control and AI governance

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Anthropic CEO Dario Amodei calls OpenAI’s message about military agreement a ‘blatant lie,’ report says

Google settles with Epic Games, lowers Play Store fees to 20%

MacBook Neo, iPhone 17e, and everything else Apple announced this week

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.