<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CSCvo60450 - Encryption RC4/AES256 &amp;amp; MS AD CVE-2022-38023 patch in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4783005#M580095</link>
    <description>&lt;P&gt;According to this bug, it stated:&amp;nbsp;&amp;nbsp;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;When user authentication initiates from ISE, ISE will connect and send the encryption types that are supported (RC4, AES128, and AES256). This enhancement is for AD tuning to only send AES 256&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;This is exactly what I am seeing between my Cisco ISE version 3.1 patch-5 (latest patch) and Microsoft Windows Active Directory (AD).&amp;nbsp; My Cisco ISE is integrated with AD for user authentication.&amp;nbsp; In other words, the ISE has to communicate with AD for username and password.&amp;nbsp; When I capture the traffic on the ISE, I can clearly see the ISE sent RC4 to AD and AD responded back with RC4 with the RPC_Netlogon protocol, as seen below:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Cisco ISE to AD request:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Auth Info: NETLOGON Secure Channel, Packet privacy, AuthContextId(186703)&lt;BR /&gt;Auth type: NETLOGON Secure Channel (68)&lt;BR /&gt;Auth level: Packet privacy (6)&lt;BR /&gt;Auth pad len: 4&lt;BR /&gt;Auth Rsrvd: 0&lt;BR /&gt;Auth Context ID: 186703&lt;BR /&gt;Secure Channel Verifier&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Sign algorithm: HMAC-MD5 (0x0077)&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Seal algorithm: RC4 (0x007a)&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;Flags: 0000&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;This is the response from Active Directory:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Auth Info: NETLOGON Secure Channel, Packet privacy, AuthContextId(186703)&lt;BR /&gt;Auth type: NETLOGON Secure Channel (68)&lt;BR /&gt;Auth level: Packet privacy (6)&lt;BR /&gt;Auth pad len: 0&lt;BR /&gt;Auth Rsrvd: 0&lt;BR /&gt;Auth Context ID: 186703&lt;BR /&gt;Secure Channel Verifier&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Sign algorithm: HMAC-MD5 (0x0077)&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Seal algorithm: RC4 (0x007a)&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;Flags: 0000&lt;/P&gt;&lt;P&gt;The problem is that come April 2023, Microsoft will release a patch,&amp;nbsp;&lt;SPAN&gt;AD CVE-2022-38023 patch, to start removing RC4 from Active Directory.&amp;nbsp; Does it mean the communication between Cisco ISE and Microsoft Active Directory will be broken?&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The Cisco bug ID&amp;nbsp;CSCvo604 listed the following Known Affected Releases Cisco ISE versions:&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;003.002(000.542)&amp;nbsp; --&amp;gt; version 3.2&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;003.001(000.518)&amp;nbsp; --&amp;gt; version 3.1&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;003.000(000.458)&amp;nbsp; --&amp;gt; version 3.0&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;002.007(000.356)&amp;nbsp; --&amp;gt; version 2.7&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;002.006(000.903)&amp;nbsp; --&amp;gt; version 2.6&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;... and more versions after this.&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;The bug ID also does NOT list any known fixes releases.&amp;nbsp; Does that mean that I will have an outage when RC4 is removed from Active Directory in April with the Microsoft&amp;nbsp;AD CVE-2022-38023 patch ?&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;TIA&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Mon, 27 Feb 2023 12:02:39 GMT</pubDate>
    <dc:creator>adamscottmaster2013</dc:creator>
    <dc:date>2023-02-27T12:02:39Z</dc:date>
    <item>
      <title>CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patch</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4783005#M580095</link>
      <description>&lt;P&gt;According to this bug, it stated:&amp;nbsp;&amp;nbsp;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;When user authentication initiates from ISE, ISE will connect and send the encryption types that are supported (RC4, AES128, and AES256). This enhancement is for AD tuning to only send AES 256&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;This is exactly what I am seeing between my Cisco ISE version 3.1 patch-5 (latest patch) and Microsoft Windows Active Directory (AD).&amp;nbsp; My Cisco ISE is integrated with AD for user authentication.&amp;nbsp; In other words, the ISE has to communicate with AD for username and password.&amp;nbsp; When I capture the traffic on the ISE, I can clearly see the ISE sent RC4 to AD and AD responded back with RC4 with the RPC_Netlogon protocol, as seen below:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Cisco ISE to AD request:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Auth Info: NETLOGON Secure Channel, Packet privacy, AuthContextId(186703)&lt;BR /&gt;Auth type: NETLOGON Secure Channel (68)&lt;BR /&gt;Auth level: Packet privacy (6)&lt;BR /&gt;Auth pad len: 4&lt;BR /&gt;Auth Rsrvd: 0&lt;BR /&gt;Auth Context ID: 186703&lt;BR /&gt;Secure Channel Verifier&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Sign algorithm: HMAC-MD5 (0x0077)&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Seal algorithm: RC4 (0x007a)&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;Flags: 0000&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;This is the response from Active Directory:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Auth Info: NETLOGON Secure Channel, Packet privacy, AuthContextId(186703)&lt;BR /&gt;Auth type: NETLOGON Secure Channel (68)&lt;BR /&gt;Auth level: Packet privacy (6)&lt;BR /&gt;Auth pad len: 0&lt;BR /&gt;Auth Rsrvd: 0&lt;BR /&gt;Auth Context ID: 186703&lt;BR /&gt;Secure Channel Verifier&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Sign algorithm: HMAC-MD5 (0x0077)&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Seal algorithm: RC4 (0x007a)&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;Flags: 0000&lt;/P&gt;&lt;P&gt;The problem is that come April 2023, Microsoft will release a patch,&amp;nbsp;&lt;SPAN&gt;AD CVE-2022-38023 patch, to start removing RC4 from Active Directory.&amp;nbsp; Does it mean the communication between Cisco ISE and Microsoft Active Directory will be broken?&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The Cisco bug ID&amp;nbsp;CSCvo604 listed the following Known Affected Releases Cisco ISE versions:&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;003.002(000.542)&amp;nbsp; --&amp;gt; version 3.2&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;003.001(000.518)&amp;nbsp; --&amp;gt; version 3.1&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;003.000(000.458)&amp;nbsp; --&amp;gt; version 3.0&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;002.007(000.356)&amp;nbsp; --&amp;gt; version 2.7&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;002.006(000.903)&amp;nbsp; --&amp;gt; version 2.6&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;... and more versions after this.&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;The bug ID also does NOT list any known fixes releases.&amp;nbsp; Does that mean that I will have an outage when RC4 is removed from Active Directory in April with the Microsoft&amp;nbsp;AD CVE-2022-38023 patch ?&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;TIA&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 27 Feb 2023 12:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4783005#M580095</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-02-27T12:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo604 - Encryption to only send AES256 &amp; MS AD CVE-2022-380</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4783072#M580097</link>
      <description>&lt;P&gt;Sounds&amp;nbsp;like a bit of a problem - I was unable to find that bug ID - did you mean&amp;nbsp;&lt;SPAN class="lower text-break align-left"&gt;CSCvo60450 ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2023 06:20:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4783072#M580097</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-02-27T06:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo604 - Encryption to only send AES256 &amp; MS AD CVE-2022-380</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4783225#M580099</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;:&amp;nbsp; Yes, CSCvo60450.&amp;nbsp; Typo on my copy and paste &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The bug ID deals with Kerberos function and I think it has to do with Krb5 TGS-REQ/TGS-REP or AS-REQ/AS-REQ:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Cisco ISE to AD request:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;etype: 3 items&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;ENCTYPE: eTYPE-AES256-CTS-HMAC-SHA1-96 (18)&lt;BR /&gt;ENCTYPE: eTYPE-AES128-CTS-HMAC-SHA1-96 (17)&lt;BR /&gt;ENCTYPE: eTYPE-ARCFOUR-HMAC-MD5 (23)&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;This is the response from Active Directory:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;enc-part&lt;BR /&gt;etype: eTYPE-AES256-CTS-HMAC-SHA1-96 (18)&lt;BR /&gt;kvno: 39&lt;BR /&gt;cipher: 3a42d63334b51e466e419d370a67eaeccb07ce3b5c72ebc15fe33b38aed5fcfa8b6908f8…&lt;/P&gt;&lt;P&gt;I thihk this is OK because the ISE sends out both AES along RC4 and Active Directory only response with the highest encryption so I assume that turning OFF RC4 in AD will be OK.&amp;nbsp; But then there is another packet called RPC_NetLogon (user authentication I think)&amp;nbsp; where ISE only sent out RC4/MD5 and AD will reply back with RC4 thus turning OFF RC4 in AD will cause things to be broken.&lt;/P&gt;&lt;P&gt;Am I right?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2023 12:03:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4783225#M580099</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-02-27T12:03:47Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4783490#M580105</link>
      <description>&lt;P&gt;I am still kind of amazed that we're even talking about RC4 at all - and if your packet analysis was done on ISE 3.1 then it will surely affect all other ISE deployments too. Have you raised a Cisco TAC case?&amp;nbsp; We should get a reply from the TAC/BU. Well spotted though. In most of my ISE deployments, AD is used. It could be a catastrophe (assuming customers patch their Windows Servers too ..).&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2023 20:30:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4783490#M580105</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-02-27T20:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4784692#M580132</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;- I have opened a TAC case as well - they are working on it.&lt;/P&gt;
&lt;P&gt;In the meantime, I ran my own Wireshark against ISE 3.1 and Windows Server 2016 and I can see that ISE negotiates a bunch of ciphers including RC4, but the Windows 2016 decides to use AES.&amp;nbsp; What version of Server did you take your evidence from?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE Kerberos Request (ARCFOUR is RC4)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISEtoAD.png" style="width: 537px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/177785iE1A7102E26B36148/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISEtoAD.png" alt="ISEtoAD.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AD Kerberos Response - no mention of RC4&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AD-reply.png" style="width: 747px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/177786i4F3F705A084B9B1E/image-size/large?v=v2&amp;amp;px=999" role="button" title="AD-reply.png" alt="AD-reply.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE should probably not be offering RC4 in its requests - but it seems plausible that a well behaving Windows Server would just ignore that cipher and use AES instead.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 04:40:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4784692#M580132</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-03-01T04:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4784713#M580133</link>
      <description>&lt;P&gt;I wasn't sure if I was missing something, but I was seeing the same behaviour as &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt; when performing a Test User using the Kerberos authentication type option.&lt;/P&gt;
&lt;P&gt;The only time I was seeing the RC4 cipher used was when I did a Test User using the MS-RPC authentication type option which, unless I'm mistaken, is not what ISE uses when performing lookups against the domain. My setup uses Windows Server 2019 (with the latest patches and and ISE 3.1p5.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 06:00:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4784713#M580133</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-03-01T06:00:38Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4784880#M580134</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;:&amp;nbsp; I tested this on both Windows 2016 and 2019 and I am seeing the same issue. What you showed above the the Kerberos packets and that is normal because ISE sent out both AES-256/128 and also RC4 requests but Active Directory (AD) only replied with AES-256 which is normal.&amp;nbsp; That's what I said in my previous replies. What you are referring to is the AS-REQ, AS-REQ, TGS-REQ and TGS-REP which is Kerberos.&lt;/P&gt;&lt;P&gt;The packet that I am referring to is the RPC_Netlogon that you could clearly see the RC4/MD5 in the seal algorithm like what I described in the original thread.&amp;nbsp; Looks for SMB packet in the wireshark capture with NetrLogonSamLogonEx and you will find RC4/MD5.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 11:50:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4784880#M580134</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-03-01T11:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4784886#M580135</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;:&amp;nbsp; Apparently Cisco ISE must be using MS-RPC to lookup users against the domain in Active Directory because I am seeing a lot of this in Active Directory everytime users are loggingg in and out of ISE.&amp;nbsp; Wouldn't that be a problem?&lt;/P&gt;&lt;P&gt;My setup is also Windows Server 2019 and ISE 3.1 with patch 5.&lt;/P&gt;&lt;P&gt;Also if you refer to the bulletin release by microsoft regarding&amp;nbsp;&lt;SPAN&gt;MS AD CVE-2022-38023, it specifically stated about the NetLogon protocol and not Kerberos:&amp;nbsp;&amp;nbsp;&lt;A href="https://support.microsoft.com/en-us/topic/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25" target="_blank"&gt;https://support.microsoft.com/en-us/topic/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Therefore, we're talking about two different things, or least that's how I understand it.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 14:20:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4784886#M580135</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-03-01T14:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4785271#M580149</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I get it now - it's when a user logs in that you will see the SMB2 Netlogon. I didn't realise this subtlety.&lt;/P&gt;
&lt;P&gt;This is from the lab 3.1p4 against a patched Windows Server 2016&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks like ISE is not even offering the AES encryption anymore ...&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="seal-rc4.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/177852i8130CE586184FD8B/image-size/large?v=v2&amp;amp;px=999" role="button" title="seal-rc4.png" alt="seal-rc4.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 20:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4785271#M580149</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-03-01T20:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4785277#M580150</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;:&amp;nbsp; thank you very much for confirming.&amp;nbsp; That's exactly what I am also seeing as well.&amp;nbsp; I am using ISE 3.1 patch-5 but I am also seeing this in ISE 3.0 patch-4 and Windows 2019 Active Directory with the latest patch.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also find it very interesting that when I enforce RC4 on Active Directory for NetLogon by adding the "RequireSeal" set to 2 in the AD registry, I still see ISE send RC4 request to AD and that AD still responds back with RC4.&amp;nbsp; In other words, everything is till working as nothing has changed.&amp;nbsp; Not sure what to make of it.&lt;/P&gt;&lt;P&gt;Another this about the Microsoft article, it stated:&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;Windows updates&amp;nbsp;address weaknesses in the Netlogon protocol when &lt;EM&gt;&lt;STRONG&gt;RPC signing is used instead of RPC sealing&lt;/STRONG&gt;&lt;/EM&gt;. More information can be found in&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023" target="_blank" rel="noopener"&gt;CVE-2022-38023&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you look in the capture, in the secure channel verifier, it has "sign algorithm" as HMAC-MD5 while "Seal algorithm" is RC4.&amp;nbsp; How is that related to the Microsoft Article?&amp;nbsp; signing and sealing?&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 21:15:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4785277#M580150</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-03-01T21:15:03Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4785290#M580151</link>
      <description>&lt;P&gt;In general crypto lingo, hashing is about confirming that you’re communicating with the party you expect (integrity) - so that means verifying the signature. In this case MD5 is used for the hashing. Better would be SHA2.&amp;nbsp;&lt;BR /&gt;Other piece of the crypto is the confidentiality of the message. The sealing of the message. Done with the symmetric cipher. In this case the olde world RC4 is the cipher. Better would have been AES.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;let’s see if Cisco can weigh in on the conversation&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 21:29:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4785290#M580151</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-03-01T21:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4785339#M580158</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt; and &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, I read through the &lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023" target="_blank" rel="noopener nofollow noreferrer"&gt;CVE-2022-38023&lt;/A&gt; again, and it just states:&lt;BR /&gt;&lt;STRONG&gt;"Enforcement mode. All clients are required to use RPC Seal, unless they are added to the "Domain Controller: Allow vulnerable Netlogon secure channel connections” group policy object (GPO)."&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;There is nothing in that CVE about an issue with using the RC4 cipher for the Seal algorithm, just that the client must use RPC Seal (rather than just RPC Sign). Since the pcap shows that both RPC Seal and RPC Sign algorithms are present, this should meet the enforcement being applied by MS.&lt;/P&gt;
&lt;P&gt;I also set the Enforcement registry setting on my 2019 server and I can still do MS-RPC lookups from ISE.&lt;/P&gt;
&lt;P&gt;That would make sense as to why the communication with AD would still be working when you change the RequireSeal registry setting to 2 (Enforcement mode).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 23:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4785339#M580158</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-03-01T23:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4798590#M580651</link>
      <description>&lt;P&gt;This is picked up and being worked on. Please keep an eye on this bug's notifications.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2023 13:59:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4798590#M580651</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2023-03-21T13:59:24Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4807520#M580927</link>
      <description>&lt;P&gt;Is there any update on this?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 12:05:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4807520#M580927</guid>
      <dc:creator>zac ragoonath</dc:creator>
      <dc:date>2023-04-04T12:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4807528#M580929</link>
      <description>&lt;P&gt;I have received this uncertain reply from TAC:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;SPAN&gt;From Cisco side, enhancement request has been opened:&lt;/SPAN&gt;&lt;BR style="caret-color: #212121; color: #212121; font-family: Calibri, sans-serif; font-size: 14.666667px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none;" /&gt;&lt;SPAN&gt;CSCvo60450 - Enhancement for encryption to only send AES256 for MS-RPC calls&lt;/SPAN&gt;&lt;BR style="caret-color: #212121; color: #212121; font-family: Calibri, sans-serif; font-size: 14.666667px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none;" /&gt;&lt;A style="color: #0078d7; text-decoration: underline; font-family: Calibri, sans-serif; font-size: 14.666667px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" title="https://bst.cisco.com/bugsearch/bug/CSCvo60450" href="https://bst.cisco.com/bugsearch/bug/CSCvo60450" target="_blank" rel="noopener"&gt;https://bst.cisco.com/bugsearch/bug/CSCvo60450&lt;/A&gt;&lt;BR style="caret-color: #212121; color: #212121; font-family: Calibri, sans-serif; font-size: 14.666667px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none;" /&gt;&lt;SPAN&gt;However, there are no workarounds as there should not be any impact, ISE will still be able to negotiate other ciphers with AD.&lt;/SPAN&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;BR /&gt;But because I can not work with "should" I am wondering if anybody managed to test Netlogon with enforcement enabled domain controller.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 12:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4807528#M580929</guid>
      <dc:creator>navtom</dc:creator>
      <dc:date>2023-04-04T12:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4807575#M580934</link>
      <description>&lt;P&gt;1. The update on April 11th will have no impact on ISE communication to Active Directory. That was the first urgent concern.&lt;BR /&gt;2. We are still communicating with Active Directory on less secure protocols, that is a longer term open item that will be addressed with a security advisory and fix to ISE. Once we have a timeline for a fix we'll work internally to get a Security Advisory out that can be tracked. In the mean time it is also tracked by CSCvo60450.&lt;BR /&gt;&lt;BR /&gt;It is important to note that MS is enforcing only "RequireSeal" for RPC communication and irrespective of the setting for this registry, there is no tested impact with ISE - AD Communication. If customers decide to enforce not using RC4 by setting the "RejectMd5Clients" to 1 EXPLICITLY on their own discretion, then it is bound to fail as we do not use any other encryption method apart from this as it stands today. The change that is being brought by MS on April 11 or July 11 does not have any impact on ISE-AD communication with the tests that were done so far. Please keep a track of this bug to get any further notifications/updates on the timelines of having a better encryption method than we have today. It is our priority as well.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 12:56:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4807575#M580934</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2023-04-04T12:56:33Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4807576#M580935</link>
      <description>&lt;P&gt;Thank you for taking the time to comment.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 12:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4807576#M580935</guid>
      <dc:creator>zac ragoonath</dc:creator>
      <dc:date>2023-04-04T12:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4831049#M581597</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/361506"&gt;@Surendra&lt;/a&gt;&amp;nbsp;, is there an update as 2023Jun and 2023-Jul-11 is approaching?&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Can we expect a security advisory before 2023Jul11 ?&lt;/LI&gt;
&lt;LI&gt;Can we expect a solution or workaround for customers who &lt;STRONG&gt;do&lt;/STRONG&gt; intend to&amp;nbsp;&lt;SPAN&gt;set "&lt;EM&gt;RejectMd5Clients&lt;/EM&gt;" to 1 explicitly? If I understand well, those clients will have ISE-AD connection broken.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;I guess an official document is preferred by Cisco to hundreds of TAC cases. (Count is 53 so far)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2023 13:26:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4831049#M581597</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2023-05-08T13:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4889537#M582967</link>
      <description>&lt;P&gt;Any news in this matter since May? It seems that the change on the MS AD has no impact but still I am wondering if it is possible to disable RC4 at all on the ISE. Wouldn't this be a clean solution?&lt;/P&gt;&lt;P&gt;Or will this be implemented by Cisco in a software patch soon?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jul 2023 09:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4889537#M582967</guid>
      <dc:creator>christian.faessler</dc:creator>
      <dc:date>2023-07-21T09:09:58Z</dc:date>
    </item>
    <item>
      <title>Re: CSCvo60450 - Encryption RC4/AES256 &amp; MS AD CVE-2022-38023 patc</title>
      <link>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4902695#M583370</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="5840 Events 9th Aug.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/193935i89FD0715236CC081/image-size/large?v=v2&amp;amp;px=999" role="button" title="5840 Events 9th Aug.png" alt="5840 Events 9th Aug.png" /&gt;&lt;/span&gt;Am having same confusion , can somebody please clear the confusion.&lt;/P&gt;&lt;P&gt;my AD team has recently deployed the path&amp;nbsp;CVE-2022-38023 and says that the 5840 event id is still not impacted ( as it just categorized as Warning ) my ISE Servers are still communicating with AD on RC4 ( find latest snap )&amp;nbsp;&lt;/P&gt;&lt;P&gt;in future if the Microsoft removes the RC4 then what do i need to do on ISE ( do i need to do it manually if yes how to do it ..?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Aug 2023 05:54:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscvo60450-encryption-rc4-aes256-amp-ms-ad-cve-2022-38023-patch/m-p/4902695#M583370</guid>
      <dc:creator>Pankaj.bandewar1</dc:creator>
      <dc:date>2023-08-10T05:54:34Z</dc:date>
    </item>
  </channel>
</rss>

