CVE-2025-20343

8.6 HIGH

📋 TL;DR

An unauthenticated remote attacker can cause Cisco Identity Services Engine (ISE) to restart unexpectedly by sending crafted RADIUS access request messages for already-rejected MAC addresses. This creates a denial of service condition affecting network authentication services. Organizations using Cisco ISE for RADIUS authentication are affected.

💻 Affected Systems

Products:
  • Cisco Identity Services Engine (ISE)
Versions: Specific affected versions not provided in CVE description; check Cisco advisory for details
Operating Systems: Cisco ISE appliance/software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with RADIUS service enabled and 'Reject RADIUS requests from clients with repeated failures' feature configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could cause repeated ISE restarts, leading to extended authentication service outages affecting all network users and devices.

🟠

Likely Case

Temporary service disruption during ISE restart, causing authentication failures for new connections until service recovers.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and response.

🌐 Internet-Facing: HIGH if RADIUS service is exposed to internet, as unauthenticated remote exploitation is possible.
🏢 Internal Only: MEDIUM if RADIUS is only internally accessible, but still exploitable by internal attackers or compromised devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific sequence of crafted RADIUS messages but no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Cisco advisory for specific fixed versions

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-radsupress-dos-8YF3JThh

Restart Required: Yes

Instructions:

1. Review Cisco advisory for affected versions. 2. Download and apply appropriate patch from Cisco. 3. Restart ISE services as required. 4. Verify patch application.

🔧 Temporary Workarounds

Disable RADIUS request rejection feature

all

Temporarily disable the 'Reject RADIUS requests from clients with repeated failures' setting to prevent exploitation

Navigate to ISE GUI > Administration > System > Settings > RADIUS > Uncheck 'Reject RADIUS requests from clients with repeated failures'

Network segmentation

all

Restrict access to RADIUS service to trusted networks only

Configure firewall rules to limit RADIUS (UDP 1812/1813, 1645/1646) access to authorized clients only

🧯 If You Can't Patch

  • Implement strict network access controls to limit RADIUS traffic to trusted sources only
  • Monitor ISE logs for repeated RADIUS failures and restart patterns, implement alerting

🔍 How to Verify

Check if Vulnerable:

Check ISE version against Cisco advisory and verify if 'Reject RADIUS requests from clients with repeated failures' is enabled

Check Version:

show application version ise (CLI) or check Administration > System > About (GUI)

Verify Fix Applied:

Verify ISE version is updated to patched version and test with simulated RADIUS requests

📡 Detection & Monitoring

Log Indicators:

  • Unexpected ISE process restarts
  • Multiple RADIUS authentication failures from same source
  • RADIUS service interruption logs

Network Indicators:

  • Unusual volume of RADIUS access requests to rejected endpoints
  • RADIUS service unresponsiveness

SIEM Query:

source="cisco_ise" AND (event_type="process_restart" OR message="*RADIUS*restart*" OR auth_result="FAILURE") | stats count by src_ip

🔗 References

📤 Share & Export