We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-20152

ISE restart



Description

A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain RADIUS requests. An attacker could exploit this vulnerability by sending a specific authentication request to a network access device (NAD) that uses Cisco ISE for authentication, authorization, and accounting (AAA). A successful exploit could allow the attacker to cause Cisco ISE to reload.

Reserved 2024-10-10 | Published 2025-05-21 | Updated 2025-05-21 | Assigner cisco


HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Problem types

Out-of-bounds Read

Product status

Default status
unknown

3.4.0
affected

References

sec.cloudapps.cisco.com/.../cisco-sa-ise-restart-ss-uf986G2Q (cisco-sa-ise-restart-ss-uf986G2Q)

cve.org (CVE-2025-20152)

nvd.nist.gov (CVE-2025-20152)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-20152

Support options

Helpdesk Chat, Email, Knowledgebase