CVE-2022-20756

8.6 HIGH

📋 TL;DR

This vulnerability in Cisco ISE's RADIUS feature allows an unauthenticated remote attacker to send crafted RADIUS requests, causing the system to stop processing RADIUS packets and leading to denial of service for authentication and authorization. It affects organizations using Cisco ISE as a RADIUS server, potentially disrupting network access for legitimate users until a manual restart is performed.

💻 Affected Systems

Products:
  • Cisco Identity Services Engine (ISE)
Versions: Cisco ISE versions 3.0, 3.1, and earlier releases, as specified in the vendor advisory.
Operating Systems: Cisco ISE-specific OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the RADIUS feature enabled; manual restart of the Policy Service Node (PSN) is required for recovery after exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of RADIUS-based authentication across the network, causing widespread access denials and operational downtime until manual intervention.

🟠

Likely Case

Intermittent authentication timeouts and access failures for users, requiring IT staff to restart affected Policy Service Nodes to restore service.

🟢

If Mitigated

Limited impact if network segmentation or rate-limiting blocks malicious traffic, but risk remains if vulnerable systems are exposed.

🌐 Internet-Facing: HIGH, as unauthenticated remote attackers can exploit it if the RADIUS service is accessible from the internet, leading to potential service outages.
🏢 Internal Only: MEDIUM, as internal attackers or malware could still trigger the denial of service, but exposure is more controlled than internet-facing scenarios.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves sending specific RADIUS requests, which may be straightforward for attackers with network access to the target.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Cisco ISE version 3.1 Patch 1 or later, as per vendor advisory.

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-dos-JLh9TxBp

Restart Required: Yes

Instructions:

1. Review the Cisco advisory for exact patch details. 2. Download and apply the patch from Cisco's support site. 3. Restart the affected Policy Service Nodes to implement the fix.

🔧 Temporary Workarounds

Network Segmentation and Access Control

all

Restrict access to the RADIUS service by implementing firewall rules or network segmentation to block untrusted sources from sending RADIUS requests.

🧯 If You Can't Patch

  • Implement strict network access controls to limit RADIUS traffic to trusted sources only.
  • Monitor logs for unusual RADIUS request patterns and prepare for manual restart procedures if exploitation occurs.

🔍 How to Verify

Check if Vulnerable:

Check the Cisco ISE version via the admin interface or CLI; if running version 3.0, 3.1, or earlier without the patch, the system is vulnerable.

Check Version:

show version (in Cisco ISE CLI) or check via the ISE admin GUI under Administration > System > About.

Verify Fix Applied:

After patching, confirm the version is updated to 3.1 Patch 1 or later and test RADIUS functionality to ensure no service interruptions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual RADIUS authentication failures or timeouts in ISE logs
  • Log entries indicating Policy Service Node restarts due to crashes.

Network Indicators:

  • Spikes in RADIUS request traffic from unknown sources
  • Failed authentication attempts with malformed packets.

SIEM Query:

Example: search for 'RADIUS' AND ('failure' OR 'timeout') in Cisco ISE logs within a short time window.

🔗 References

📤 Share & Export