We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain RADIUS requests. An attacker could exploit this vulnerability by sending a specific authentication request to a network access device (NAD) that uses Cisco ISE for authentication, authorization, and accounting (AAA). A successful exploit could allow the attacker to cause Cisco ISE to reload.
Reserved 2024-10-10 | Published 2025-05-21 | Updated 2025-05-21 | Assigner ciscosec.cloudapps.cisco.com/.../cisco-sa-ise-restart-ss-uf986G2Q (cisco-sa-ise-restart-ss-uf986G2Q)
Support options