CVE-2023-20243Improper Handling of Exceptional Conditions in Cisco Identity Services Engine Software

Severity
8.6HIGHNVD
EPSS
0.4%
top 40.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 6

Description

A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause the affected system to stop processing RADIUS packets. This vulnerability is due to improper handling of certain RADIUS accounting requests. An attacker could exploit this vulnerability by sending a crafted authentication request to a network access device (NAD) that uses Cisco ISE for authentication, authorization, and accounting (AAA). This w

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 3.9 | Impact: 4.0

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-64jj-6hmj-39jw: A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to ca2023-09-06
CVEList
CVE-2023-20243: A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to ca2023-09-06

📋Vendor Advisories

1
Cisco
Cisco Identity Services Engine RADIUS Denial of Service Vulnerability2023-09-06
CVE-2023-20243 — Cisco vulnerability | cvebase