CVE-2022-20937
04.11.2022, 18:15
A vulnerability in a feature that monitors RADIUS requests on Cisco Identity Services Engine (ISE) Software could allow an unauthenticated, remote attacker to negatively affect the performance of an affected device. This vulnerability is due to insufficient management of system resources. An attacker could exploit this vulnerability by taking actions that cause Cisco ISE Software to receive specific RADIUS traffic. A successful and sustained exploit of this vulnerability could allow the attacker to cause reduced performance of the affected device, resulting in significant delays to RADIUS authentications. There are workarounds that address this vulnerability.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | identity_services_engine | 𝑥 < 2.7.0 |
cisco | identity_services_engine | 2.7.0 |
cisco | identity_services_engine | 2.7.0:patch1 |
cisco | identity_services_engine | 2.7.0:patch2 |
cisco | identity_services_engine | 2.7.0:patch3 |
cisco | identity_services_engine | 2.7.0:patch4 |
cisco | identity_services_engine | 2.7.0:patch5 |
cisco | identity_services_engine | 2.7.0:patch6 |
cisco | identity_services_engine | 2.7.0:patch7 |
cisco | identity_services_engine | 3.0.0 |
cisco | identity_services_engine | 3.0.0:patch1 |
cisco | identity_services_engine | 3.0.0:patch2 |
cisco | identity_services_engine | 3.0.0:patch3 |
cisco | identity_services_engine | 3.0.0:patch4 |
cisco | identity_services_engine | 3.0.0:patch5 |
cisco | identity_services_engine | 3.1 |
cisco | identity_services_engine | 3.1:patch1 |
cisco | identity_services_engine | 3.1:patch3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-410 - Insufficient Resource PoolThe software's resource pool is not large enough to handle peak demand, which allows an attacker to prevent others from accessing the resource by using a (relatively) large number of requests for resources.
- CWE-400 - Uncontrolled Resource ConsumptionThe software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.