
====================================================================

                             CERT-Renater

                 Note d'Information No. 2018/VULN185
_____________________________________________________________________

DATE                : 17/05/2018

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Cisco Identity Services Engine
                                      software.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-iseeap
_____________________________________________________________________

Cisco Security Advisory: Cisco Identity Services Engine EAP TLS
Certificate Denial of Service Vulnerability

Advisory ID: cisco-sa-20180516-iseeap

Revision: 1.0

For Public Release: 2018 May 16 16:00 GMT

Last Updated: 2018 May 16 16:00 GMT

CVE ID(s): CVE-2018-0277

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+---------------------------------------------------------------------

Summary

=======

A vulnerability in the Extensible Authentication Protocol-Transport
Layer Security (EAP-TLS) certificate validation during EAP
authentication for the Cisco Identity Services Engine (ISE) could allow
an unauthenticated, remote attacker to cause the ISE application server
to restart  unexpectedly, causing a denial of service (DoS) condition on
an affected system.

The vulnerability is due to incomplete input validation of the client
EAP-TLS certificate. An attacker could exploit this vulnerability by
initiating EAP authentication over TLS to the ISE with a crafted EAP-TLS
certificate. A successful exploit could allow the attacker to restart
the ISE application server, resulting in a DoS condition on the affected
system. The ISE application could continue to restart while the client
attempts to establish the EAP authentication connection.

If an attacker attempted to import the same EAP-TLS certificate to the
ISE trust store, it could trigger a DoS condition on the affected
system. This exploit vector would require the attacker to have valid
administrator credentials.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-iseeap
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-iseeap"]


==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================



