
In a comment to CSO, he said, “The vulnerability allows an attacker to bypass authentication and gain privileged access, enabling lateral movement across the network, which is dangerous. The uniqueness of this flaw lies in its potential to bypass identity-based security controls, making traditional defenses like passwords and basic authentication insufficient.”
A fix is available, irrespective of service contracts
The vulnerabilities impact Cisco ISE and Cisco Passive Identity Connector (ISE-PIC) appliances, regardless of device configuration, the company added. All versions before v3.4, which is not impacted, are supplied a fix.
Fixes are available as per affected versions, including 3.1P10 for 3.1, 3.2p7 for 3.2, and 3.3p4 for 3.3. For users running version 3.0 and earlier, Cisco recommended migrating to a fixed release. As the flaws affect all configurations, and no workaround is available for protection, fixing the affected systems is the only way out of exploitation.