Executive Risk Summary
"A vulnerability in the RADIUS setting of Cisco Identity Services Engine could allow an unauthenticated, remote attacker to cause a denial of service condition by sending crafted RADIUS access request messages, leading to an unexpected restart of the system. This vulnerability is due to a logic error when processing a RADIUS access request for a MAC address that is already a rejected endpoint."
Operational Audit Arsenal
Target Type System Service
Target Asset RADIUS Service
Standard Path Global Firmware
Manual Verification Required
This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.
Patch Impact Forecast
Reboot Required Likely
High
Internal Work Notes
CVE-2025-20343: Potential DoS vulnerability in Cisco ISE RADIUS setting, requiring immediate attention and patching to prevent service disruption.
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Related Cisco Threats
Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.