<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Turning RC4 in Microsoft Active Directory - CVE-2022-38023 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4777667#M579893</link>
    <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;the bug that you mention&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvo60450" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvo60450&lt;/A&gt;&amp;nbsp;is affecting the versions 3.X of ISE , as the bug states the ISE supports encryption AES128 and AES256 as well of RC4 when communicating with the AD , so when you turn off the RC4 from your AD, the other fallback methods will be used by ISE to communicate with your AD , what you can do is to take capture from the ISE towards the AD to review if RCA is being used , you have to make sure that your AD handles the AES versions from where ISE will encrypt the traffic .&amp;nbsp; In the situation where there is no communication between ISE and your AD , what I would advise is to try to deregister /register back your nodes with your AD.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if that helped you.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Feb 2023 20:15:04 GMT</pubDate>
    <dc:creator>Rodrigo Diaz</dc:creator>
    <dc:date>2023-02-17T20:15:04Z</dc:date>
    <item>
      <title>Turning RC4 in Microsoft Active Directory - CVE-2022-38023</title>
      <link>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4777065#M579881</link>
      <description>&lt;P&gt;I have two Production Cisco ISE environment.&amp;nbsp; Environment #1 is Cisco ISE version 3.1 patch 5 and Environment #2 is Cisco ISE version 3.0 patch 4.&amp;nbsp; Both Cisco ISE environments are integrated with Microsoft Active Directory.&lt;/P&gt;&lt;P&gt;Today, I was informed by the Active Directory (AD) Administrators that they will implement&amp;nbsp;CVE-2022-38023 and they will turn OFF RC4 on the AD servers.&lt;/P&gt;&lt;P&gt;Does it mean that communications between Cisco ISE and Microsoft ADs will be broken if they turn off RC4?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/cisco-ise-with-ad-cve-2022-38023-patch/m-p/4726688#M578449" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/network-access-control/cisco-ise-with-ad-cve-2022-38023-patch/m-p/4726688#M578449&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCvo60450" target="_blank" rel="noopener"&gt;https://bst.cisco.com/bugsearch/bug/CSCvo60450&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCvo60450" target="_blank" rel="noopener"&gt;https://bst.cisco.com/bugsearch/bug/CSCvo60450&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It looks like Cisco ISE 3.0 and 3.1 are also impacted by this?&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;&lt;P&gt;P.S.:&amp;nbsp; I also opened a TAC case with cisco but the TAC engineer is pretty much clueless and he said that he would get back to me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 21:30:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4777065#M579881</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-02-16T21:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: Turning RC4 in Microsoft Active Directory - CVE-2022-38023</title>
      <link>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4777667#M579893</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;the bug that you mention&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvo60450" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvo60450&lt;/A&gt;&amp;nbsp;is affecting the versions 3.X of ISE , as the bug states the ISE supports encryption AES128 and AES256 as well of RC4 when communicating with the AD , so when you turn off the RC4 from your AD, the other fallback methods will be used by ISE to communicate with your AD , what you can do is to take capture from the ISE towards the AD to review if RCA is being used , you have to make sure that your AD handles the AES versions from where ISE will encrypt the traffic .&amp;nbsp; In the situation where there is no communication between ISE and your AD , what I would advise is to try to deregister /register back your nodes with your AD.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if that helped you.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 20:15:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4777667#M579893</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2023-02-17T20:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: Turning RC4 in Microsoft Active Directory - CVE-2022-38023</title>
      <link>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4777717#M579898</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/632778"&gt;@Rodrigo Diaz&lt;/a&gt;:&amp;nbsp; I don't agree with this statement:&amp;nbsp; "i&lt;SPAN&gt;n the situation where there is no communication between ISE and your AD , what &lt;STRONG&gt;I would advise is to try to deregister /register back your nodes with your AD&lt;/STRONG&gt;"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;!--This is a stupid advice.&amp;nbsp; --&gt;I can't do this in a production environment.&amp;nbsp; This is what TAC engineer typically suggests.&lt;/P&gt;
&lt;P&gt;If ISE claims that it supports&amp;nbsp;&lt;SPAN&gt;AES128 and AES256, then turning OFF RC4 on the AD servers should NOT impact the communication between ISE and AD servers, correct?&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When you mentioned deregister/register, you meant leave/join with AD servers, right?&amp;nbsp; deregister/register is a term to remove/add nodes into the ISE cluster.&amp;nbsp; Do I have to do that for all nodes?&amp;nbsp; For example, I have:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;node#1:&amp;nbsp; Primary admin, Primary MNT&lt;/P&gt;
&lt;P&gt;node#2: Secondary admin, secondary MNT&lt;/P&gt;
&lt;P&gt;node#3: PSN&lt;/P&gt;
&lt;P&gt;node #4: PSN&lt;/P&gt;
&lt;P&gt;Do I have to do that for ALL nodes?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Feb 2023 17:30:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4777717#M579898</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-02-20T17:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: Turning RC4 in Microsoft Active Directory - CVE-2022-38023</title>
      <link>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4778699#M579936</link>
      <description>&lt;P&gt;Answering your questions , yes ISE does support that protocols so as long as you have them in your AD , you should be fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The reason I asked you to take a capture is to verify if you are using RC4 or any AES protocol, in case you are using AES as protocol to encrypt packets between ISE and your AD you can turn off RC4 without any issue, in case you run into any communication issues you can remove/add the AD servers from ISE ( a maintenance window would be recommended ) as the ISE and AD will have to re negotiate the encryption, and yes, you will have to do this procedure if your communication fails with all the nodes within your production.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Feb 2023 17:54:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4778699#M579936</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2023-02-20T17:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: Turning RC4 in Microsoft Active Directory - CVE-2022-38023</title>
      <link>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4807052#M580917</link>
      <description>&lt;P&gt;Hi, were you able to find an answer to this?&amp;nbsp; We are facing the same dilemma with ISE.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ricky&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 01:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4807052#M580917</guid>
      <dc:creator>Ricky S</dc:creator>
      <dc:date>2023-04-04T01:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: Turning RC4 in Microsoft Active Directory - CVE-2022-38023</title>
      <link>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4807070#M580918</link>
      <description>&lt;P&gt;See a more recent discussion here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/td-p/4783005" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/td-p/4783005&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 03:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4807070#M580918</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-04-04T03:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: Turning RC4 in Microsoft Active Directory - CVE-2022-38023</title>
      <link>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4807524#M580928</link>
      <description>&lt;P&gt;that thread doesn't have a conclusion though. any update you know of?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 12:08:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4807524#M580928</guid>
      <dc:creator>zac ragoonath</dc:creator>
      <dc:date>2023-04-04T12:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: Turning RC4 in Microsoft Active Directory - CVE-2022-38023</title>
      <link>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4807673#M580939</link>
      <description>&lt;P&gt;See Page 2:&lt;/P&gt;
&lt;P&gt;from&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/361506"&gt;@Surendra&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lia-quilt-row lia-quilt-row-message-main"&gt;
&lt;DIV class="lia-quilt-column lia-quilt-column-24 lia-quilt-column-single lia-quilt-column-message-main-content"&gt;
&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-single"&gt;
&lt;DIV id="bodyDisplay_0" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;1. The update on April 11th will have no impact on ISE communication to Active Directory. That was the first urgent concern.&lt;BR /&gt;2. We are still communicating with Active Directory on less secure protocols, that is a longer term open item that will be addressed with a security advisory and fix to ISE. Once we have a timeline for a fix we'll work internally to get a Security Advisory out that can be tracked. In the mean time it is also tracked by&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://quickview.cloudapps.cisco.com/quickview/bug/CSCvo60450" target="_blank" rel="noopener"&gt;CSCvo60450&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;It is important to note that MS is enforcing only "RequireSeal" for RPC communication and irrespective of the setting for this registry, there is no tested impact with ISE - AD Communication. If customers decide to enforce not using RC4 by setting the "RejectMd5Clients" to 1 EXPLICITLY on their own discretion, then it is bound to fail as we do not use any other encryption method apart from this as it stands today. The change that is being brought by MS on April 11 or July 11 does not have any impact on ISE-AD communication with the tests that were done so far. Please keep a track of this bug to get any further notifications/updates on the timelines of having a better encryption method than we have today. It is our priority as well.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 04 Apr 2023 15:06:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4807673#M580939</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-04-04T15:06:42Z</dc:date>
    </item>
    <item>
      <title>Re: Turning RC4 in Microsoft Active Directory - CVE-2022-38023</title>
      <link>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4807692#M580940</link>
      <description>&lt;P&gt;yup. i asked there and the Cisco employee replied.&lt;/P&gt;
&lt;P&gt;thxx&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 15:30:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/turning-rc4-in-microsoft-active-directory-cve-2022-38023/m-p/4807692#M580940</guid>
      <dc:creator>zac ragoonath</dc:creator>
      <dc:date>2023-04-04T15:30:03Z</dc:date>
    </item>
  </channel>
</rss>

