Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

Tesla loses its appeal to Indian loyalists – even if the masks finally deliver

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Faults in Critical Cisco ISE authentication affect cloud deployments on AWS, Azure, and OCI
Identity

Faults in Critical Cisco ISE authentication affect cloud deployments on AWS, Azure, and OCI

userBy userJune 5, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 5th, 2025Ravi LakshmananNetwork Security/Vulnerabilities

Cisco ISE AUTH bypass defects

Cisco has released security patches to address critical security flaws affecting the Identity Services Engine (ISE).

The security flaw tracked as CVE-2025-20286 has a CVSS score of 9.9 out of 10.0. It is said to be a static credential vulnerability.

“Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments allow ruthless remote attackers to access sensitive data, perform restricted management operations, modify system configurations, and denies services within the system.”

The networking equipment manufacturer, who praised GMO Cybersecurity’s Kentaro Kawane for reporting the flaws, noted that they are aware of the existence of proof of concept (POC) exploits. There is no evidence that it was misused in the wild.

Cybersecurity

Cisco said the issue stems from the fact that when Cisco ISE is deployed on a cloud platform, the credentials are generated improperly, and different deployments share the same credentials as long as the software release and cloud platform are the same.

Put another way, static credentials are specific to each release and platform, but not valid across platforms. As the company emphasizes, all instances of Cisco ISE Release 3.1 on AWS have the same static credentials.

However, the credentials valid for accessing a Release 3.1 deployment are not valid for accessing a Release 3.2 deployment on the same platform. Additionally, AWS release 3.2 does not have the same credentials as Azure release 3.2.

The successful exploitation of the vulnerability allows an attacker to extract user credentials from a Cisco ISE cloud deployment and use it to access Cisco ISE deployed to other cloud environments through a specific port.

This ultimately allows for unauthorized access to sensitive data, perform limited administrative operations, modify system configuration, or disruption of services. That said, Cisco ISE is only affected if the primary management node is deployed in the cloud. Primary management nodes that are on-premises are not affected.

Cybersecurity

The following versions are affected –

AWS -Cisco ISE 3.1, 3.2, 3.3, and 3.4 Azure -Cisco ISE 3.2, 3.3, and 3.4 OCI -Cisco ISE 3.2, 3.3, and 3.4

Although there is no workaround to address CVE-2025-20286, Cisco recommends that users either restrict traffic to certified administrators or run the “Application Reset Configuration ISE” command to reset the user password to the new value. However, it has been pointed out that running the command will reset Cisco ISE to its factory configuration.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAlphabet CEO Sundar Pichai dismisses the fear of AI work and highlights expansion plans
Next Article How BioReCer is transforming certification standards across Europe
user
  • Website

Related Posts

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

July 20, 2025

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

July 20, 2025

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

July 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

Tesla loses its appeal to Indian loyalists – even if the masks finally deliver

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.