<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CSCwo99449 - ISE Unauthenticated Remote Code Execution Vulnerabili in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cscwo99449-ise-unauthenticated-remote-code-execution/m-p/5310678#M597340</link>
    <description>&lt;P&gt;Hello, &lt;BR /&gt;From the new point of view, it looks that we need Patch 7. Does anybody know, what's wrong with the Patch 6, which has been found as not enough to repair the vulnerability? When we have P6 everywhere, are our ISE close to be safe, with just some minor problem, or it is the same vulnerable state, like before i patched everything from 4 to 6 ?&lt;/P&gt;</description>
    <pubDate>Thu, 17 Jul 2025 15:53:10 GMT</pubDate>
    <dc:creator>m-karasek</dc:creator>
    <dc:date>2025-07-17T15:53:10Z</dc:date>
    <item>
      <title>CSCwo99449 - ISE Unauthenticated Remote Code Execution Vulnerability</title>
      <link>https://community.cisco.com/t5/network-access-control/cscwo99449-ise-unauthenticated-remote-code-execution/m-p/5303905#M597338</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Please clarify the requirements to&amp;nbsp;mitigate the&amp;nbsp;Vulnerability.&lt;BR /&gt;3.3.0.430-Patch6 is enough to mitigate the&amp;nbsp;Vulnerability or required&amp;nbsp;ise-apply-CSCwo99449_3.3.0.430_patch4-SPA.tar.gz even if ISE is work in 3.3.0.430-Patch6.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 756px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/247281i6C59CA0D2227A532/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 06:59:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscwo99449-ise-unauthenticated-remote-code-execution/m-p/5303905#M597338</guid>
      <dc:creator>takuya.hokazono</dc:creator>
      <dc:date>2025-06-30T06:59:17Z</dc:date>
    </item>
    <item>
      <title>Re: CSCwo99449 - ISE Unauthenticated Remote Code Execution Vulnerabili</title>
      <link>https://community.cisco.com/t5/network-access-control/cscwo99449-ise-unauthenticated-remote-code-execution/m-p/5303910#M597339</link>
      <description>&lt;P&gt;No release note for P6 now but Patch 6 is fixed release in Bug search tool so I'm gonna patch up to P6. But it's helpful if someone answers to my question.&lt;BR /&gt;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCwo99449" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCwo99449&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 07:03:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscwo99449-ise-unauthenticated-remote-code-execution/m-p/5303910#M597339</guid>
      <dc:creator>takuya.hokazono</dc:creator>
      <dc:date>2025-06-30T07:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: CSCwo99449 - ISE Unauthenticated Remote Code Execution Vulnerabili</title>
      <link>https://community.cisco.com/t5/network-access-control/cscwo99449-ise-unauthenticated-remote-code-execution/m-p/5310678#M597340</link>
      <description>&lt;P&gt;Hello, &lt;BR /&gt;From the new point of view, it looks that we need Patch 7. Does anybody know, what's wrong with the Patch 6, which has been found as not enough to repair the vulnerability? When we have P6 everywhere, are our ISE close to be safe, with just some minor problem, or it is the same vulnerable state, like before i patched everything from 4 to 6 ?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jul 2025 15:53:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscwo99449-ise-unauthenticated-remote-code-execution/m-p/5310678#M597340</guid>
      <dc:creator>m-karasek</dc:creator>
      <dc:date>2025-07-17T15:53:10Z</dc:date>
    </item>
    <item>
      <title>Re: CSCwo99449 - ISE Unauthenticated Remote Code Execution Vulnerabili</title>
      <link>https://community.cisco.com/t5/network-access-control/cscwo99449-ise-unauthenticated-remote-code-execution/m-p/5310910#M597349</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1307709"&gt;@takuya.hokazono&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;please take a look at:&amp;nbsp;&lt;A id="link_7" class="page-link lia-link-navigation lia-custom-event" href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-related-vulnerability-cve-2025-20281-amp-20282-amp/ta-p/5302518" target="_blank" rel="noopener"&gt;Cisco ISE related Vulnerability (CVE-2025-20281 &amp;amp; 20282 &amp;amp; 20337)&lt;/A&gt;, pay special attention to the &lt;STRONG&gt;IMPORTANT&lt;/STRONG&gt; part of the &lt;STRONG&gt;Article&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2025 05:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscwo99449-ise-unauthenticated-remote-code-execution/m-p/5310910#M597349</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2025-07-18T05:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: CSCwo99449 - ISE Unauthenticated Remote Code Execution Vulnerabili</title>
      <link>https://community.cisco.com/t5/network-access-control/cscwo99449-ise-unauthenticated-remote-code-execution/m-p/5310977#M597355</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/300697"&gt;@m-karasek&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;&amp;nbsp;Yes, our team is applying path 7 in the maintenance window. It's greate helpful attentions to me and my team.&lt;BR /&gt;Many thanks!&lt;BR /&gt;Takuya&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2025 07:50:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cscwo99449-ise-unauthenticated-remote-code-execution/m-p/5310977#M597355</guid>
      <dc:creator>takuya.hokazono</dc:creator>
      <dc:date>2025-07-18T07:50:17Z</dc:date>
    </item>
  </channel>
</rss>

