<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE - MAB Cloning Attack in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-mab-cloning-attack/m-p/4534683#M572294</link>
    <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/730677"&gt;@LKL4&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;please take a look at the following post: &lt;A href="https://community.cisco.com/t5/switching/mac-move-question/td-p/1558097" target="_blank" rel="noopener"&gt;MAC Move&amp;nbsp;Question&lt;/A&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
    <pubDate>Wed, 19 Jan 2022 21:25:32 GMT</pubDate>
    <dc:creator>Marcelo Morais</dc:creator>
    <dc:date>2022-01-19T21:25:32Z</dc:date>
    <item>
      <title>Cisco ISE - MAB Cloning Attack</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-mab-cloning-attack/m-p/4534556#M572287</link>
      <description>&lt;P&gt;Hello team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im using Cisco ISE 2.7 and i want to know something about guest auth. So, guest auth use mab to authenticate n the network...&amp;nbsp;let's suppose that i discover one MAC of a guest user that is connected, If I clone this MAC and try to connect to the guest network, what will the behavior be? Has anyone had this experience?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jan 2022 19:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-mab-cloning-attack/m-p/4534556#M572287</guid>
      <dc:creator>LKL4</dc:creator>
      <dc:date>2022-01-19T19:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - MAB Cloning Attack</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-mab-cloning-attack/m-p/4534568#M572291</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/730677"&gt;@LKL4&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What a great question. I haven’t tried that myself. In theory it sounds like ISE would handle the cloned device as if it were the real thing, but I have a feeling it will fail, since the session ID of the clone will be different and unique. This causes ISE to have two session IDs for the same MAC address. It’s weird and I suspect ISE would throw an error.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Have you tested this ?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jan 2022 19:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-mab-cloning-attack/m-p/4534568#M572291</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-01-19T19:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - MAB Cloning Attack</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-mab-cloning-attack/m-p/4534572#M572292</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I didn't test it&amp;nbsp;because at the moment i don't have a lab environment. Let's see if anyone in the community knows or has experienced this.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jan 2022 19:37:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-mab-cloning-attack/m-p/4534572#M572292</guid>
      <dc:creator>LKL4</dc:creator>
      <dc:date>2022-01-19T19:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - MAB Cloning Attack</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-mab-cloning-attack/m-p/4534683#M572294</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/730677"&gt;@LKL4&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;please take a look at the following post: &lt;A href="https://community.cisco.com/t5/switching/mac-move-question/td-p/1558097" target="_blank" rel="noopener"&gt;MAC Move&amp;nbsp;Question&lt;/A&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jan 2022 21:25:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-mab-cloning-attack/m-p/4534683#M572294</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-01-19T21:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - MAB Cloning Attack</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-mab-cloning-attack/m-p/4534769#M572296</link>
      <description>&lt;P&gt;If the &lt;A href="https://community.cisco.com/t5/network-access-control/employee-cwa-guest-portal-flow-with-remember-me/m-p/3423000" target="_blank" rel="noopener"&gt;Remember Me&lt;/A&gt; option is used for Guest, any subsequent connections using the registered MAC address (like a spoofed one) would be permitted access until the endpoint MAC address is purged. Endpoints that use random MAC addresses can complicate these flows.&lt;/P&gt;
&lt;P&gt;I tested this scenario and, as I suspected, the original endpoint connected to my guest WLAN lost connectivity when my 'attacker' endpoint connected with the same spoofed MAC address (without being redirected to the Guest portal).&lt;/P&gt;
&lt;P&gt;I'm not sure, however, what value (other than kicking the original endpoint off) a threat actor would gain from spoofing the MAC and getting access to the guest network. The guest network should be treated as untrusted and segmented from any trusted networks/resources. Any users/endpoints requiring access to corporate resources from the guest network, should require a secure connection method (e.g. VPN, VDI, etc.) that implements other security controls like MFA, device health, etc.&lt;/P&gt;
&lt;P&gt;Most customers I have worked with use the guest network for internet-only connectivity and anchored the WLAN to the DMZ (for Wireless) or used VRF/VXLAN mechanisms (for Wired).&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jan 2022 00:07:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-mab-cloning-attack/m-p/4534769#M572296</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-01-20T00:07:03Z</dc:date>
    </item>
  </channel>
</rss>

