5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
48.7%
A vulnerability in a feature that monitors RADIUS requests on Cisco Identity Services Engine (ISE) Software could allow an unauthenticated, remote attacker to negatively affect the performance of an affected device.
This vulnerability is due to insufficient management of system resources. An attacker could exploit this vulnerability by taking actions that cause Cisco ISE Software to receive specific RADIUS traffic. A successful and sustained exploit of this vulnerability could allow the attacker to cause reduced performance of the affected device, resulting in significant delays to RADIUS authentications.
There are workarounds that address this vulnerability.
[
{
"vendor": "Cisco",
"product": "Cisco Identity Services Engine Software",
"versions": [
{
"version": "2.6.0",
"status": "affected"
},
{
"version": "2.6.0 p1",
"status": "affected"
},
{
"version": "2.6.0 p2",
"status": "affected"
},
{
"version": "2.6.0 p3",
"status": "affected"
},
{
"version": "2.6.0 p5",
"status": "affected"
},
{
"version": "2.6.0 p6",
"status": "affected"
},
{
"version": "2.6.0 p7",
"status": "affected"
},
{
"version": "2.6.0 p8",
"status": "affected"
},
{
"version": "2.6.0 p9",
"status": "affected"
},
{
"version": "2.6.0 p10",
"status": "affected"
},
{
"version": "2.6.0 p11",
"status": "affected"
},
{
"version": "2.6.0 p12",
"status": "affected"
},
{
"version": "2.7.0",
"status": "affected"
},
{
"version": "2.7.0 p1",
"status": "affected"
},
{
"version": "2.7.0 p2",
"status": "affected"
},
{
"version": "2.7.0 p3",
"status": "affected"
},
{
"version": "2.7.0 p4",
"status": "affected"
},
{
"version": "2.7.0 p5",
"status": "affected"
},
{
"version": "2.7.0 p6",
"status": "affected"
},
{
"version": "2.7.0 p7",
"status": "affected"
},
{
"version": "3.0.0",
"status": "affected"
},
{
"version": "3.0.0 p1",
"status": "affected"
},
{
"version": "3.0.0 p2",
"status": "affected"
},
{
"version": "3.0.0 p3",
"status": "affected"
},
{
"version": "3.0.0 p4",
"status": "affected"
},
{
"version": "3.0.0 p5",
"status": "affected"
},
{
"version": "3.1.0",
"status": "affected"
},
{
"version": "3.1.0 p1",
"status": "affected"
}
]
}
]
More
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
48.7%