<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE 2.4.0.357 patch 5 CVE-2018-15459 CSCvi44041 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-4-0-357-patch-5-cve-2018-15459-cscvi44041/m-p/3797042#M485403</link>
    <description>&lt;P&gt;It is fixed with patch2 for 2.4 release. Looks like this defect was never added to any of the release notes as it was fixed for older versions as well. I will work with document team on why that is. Thanks for bringing this to our attention.&lt;/P&gt;</description>
    <pubDate>Thu, 07 Feb 2019 17:19:44 GMT</pubDate>
    <dc:creator>howon</dc:creator>
    <dc:date>2019-02-07T17:19:44Z</dc:date>
    <item>
      <title>Cisco ISE 2.4.0.357 patch 5 CVE-2018-15459 CSCvi44041</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-4-0-357-patch-5-cve-2018-15459-cscvi44041/m-p/3796619#M485399</link>
      <description>&lt;P&gt;Hello Gentlemen&lt;/P&gt;
&lt;P&gt;I have ISE-cube 2.4.0.357 patch 5 &amp;amp; CVE-2018-15459 (bug id CSCvi44041).&lt;/P&gt;
&lt;P&gt;&amp;amp; i have something mutually exclusive on this vulnerability. specifically &lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-ise-privilege" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-ise-privilege&lt;/A&gt; states that vulnerability is fixed in 2.4 patch 2, BUT 2.4 RNs &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/release_notes/b_ise_24_rn.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/release_notes/b_ise_24_rn.html&lt;/A&gt; doesnt confirm previous to be true. So which document must be trusted &amp;amp; is there any patch|hotfix for this vulnerability?&lt;/P&gt;
&lt;P&gt;Clarification on this question&amp;nbsp;is highly appreciated :0)&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 09:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-4-0-357-patch-5-cve-2018-15459-cscvi44041/m-p/3796619#M485399</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2019-02-07T09:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 2.4.0.357 patch 5 CVE-2018-15459 CSCvi44041</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-4-0-357-patch-5-cve-2018-15459-cscvi44041/m-p/3797042#M485403</link>
      <description>&lt;P&gt;It is fixed with patch2 for 2.4 release. Looks like this defect was never added to any of the release notes as it was fixed for older versions as well. I will work with document team on why that is. Thanks for bringing this to our attention.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 17:19:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-4-0-357-patch-5-cve-2018-15459-cscvi44041/m-p/3797042#M485403</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-02-07T17:19:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 2.4.0.357 patch 5 CVE-2018-15459 CSCvi44041</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-4-0-357-patch-5-cve-2018-15459-cscvi44041/m-p/3797099#M485407</link>
      <description>&lt;P&gt;10x buddy&lt;/P&gt;
&lt;P&gt;have a nice day&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 18:28:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-4-0-357-patch-5-cve-2018-15459-cscvi44041/m-p/3797099#M485407</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2019-02-07T18:28:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 2.4.0.357 patch 5 CVE-2018-15459 CSCvi44041</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-4-0-357-patch-5-cve-2018-15459-cscvi44041/m-p/3801164#M485410</link>
      <description>&lt;P&gt;To close the loop on this, the RNs have been updated to reflect fix for &lt;SPAN style="caret-color: #000000; color: #000000; font-family: Calibri, sans-serif; font-size: 14.666666984558105px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none; display: inline !important; float: none;"&gt;CSCvi44041&lt;/SPAN&gt;. Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 16:58:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-4-0-357-patch-5-cve-2018-15459-cscvi44041/m-p/3801164#M485410</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-02-13T16:58:55Z</dc:date>
    </item>
  </channel>
</rss>

