<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE Unauthenticated Remote Code Execution Vulnerabilities in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311613#M597373</link>
    <description>&lt;P&gt;As per i know there is no need of fresh install&amp;nbsp; you can just patch on top of the patch, patch 7 recent security fix.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 20 Jul 2025 21:36:53 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2025-07-20T21:36:53Z</dc:date>
    <item>
      <title>Cisco ISE Unauthenticated Remote Code Execution Vulnerabilities</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311595#M597368</link>
      <description>&lt;P&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6" target="_blank"&gt;Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It stated that:&amp;nbsp; "If Cisco ISE is running&amp;nbsp;&lt;STRONG&gt;Release 3.3 Patch 6&lt;/STRONG&gt;, additional fixes are available in&amp;nbsp;&lt;STRONG&gt;Release 3.3 Patch 7&lt;/STRONG&gt;, and the device must be upgraded".&amp;nbsp; &amp;nbsp;What the hell does this even mean "must be upgraded"?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just patched my ISE system from 3.3 patch-4 to 3.3 patch-6 three days.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone clarify this?&amp;nbsp; TIA&lt;/P&gt;</description>
      <pubDate>Sun, 20 Jul 2025 19:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311595#M597368</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2025-07-20T19:32:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Unauthenticated Remote Code Execution Vulnerabilities</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311603#M597369</link>
      <description>&lt;P&gt;yes even you patched yesterday, you need to patch today to be secure. (i know its not a great practice, this what it is now a days).&lt;/P&gt;
&lt;P&gt;We all are in same boat.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Jul 2025 20:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311603#M597369</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-07-20T20:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Unauthenticated Remote Code Execution Vulnerabilities</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311609#M597371</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;:&amp;nbsp; What does this statement mean "&lt;SPAN&gt;If Cisco ISE is running&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Release 3.3 Patch 6&lt;/EM&gt;&lt;SPAN&gt;, additional fixes are available in&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Release 3.3 Patch 7&lt;/EM&gt;&lt;SPAN&gt;, and &lt;STRONG&gt;&lt;EM&gt;the device must be upgraded&lt;/EM&gt;&lt;/STRONG&gt;."&amp;nbsp; What does Cisco mean when it says "upgraded" as oppose to "fresh install"?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Jul 2025 20:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311609#M597371</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2025-07-20T20:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Unauthenticated Remote Code Execution Vulnerabilities</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311613#M597373</link>
      <description>&lt;P&gt;As per i know there is no need of fresh install&amp;nbsp; you can just patch on top of the patch, patch 7 recent security fix.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Jul 2025 21:36:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311613#M597373</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-07-20T21:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Unauthenticated Remote Code Execution Vulnerabilities</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311614#M597374</link>
      <description>&lt;P&gt;That is my understanding as well, but I question why Cisco put in that statement in the first place.&amp;nbsp; Something doesn't seem right.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Jul 2025 21:50:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311614#M597374</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2025-07-20T21:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Unauthenticated Remote Code Execution Vulnerabilities</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311616#M597375</link>
      <description>&lt;P&gt;They are just using the term upgrading in a sense of patching. In this case upgrade means installing patch 7 as patches are always installed.&lt;/P&gt;
&lt;P&gt;I know it's frustrating, but as &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;also said.. it is what it is and we are all in the same boat.&lt;/P&gt;
&lt;P&gt;They found a new security breach and released a patch to fix it - that sometimes happens multiple times shortly after another..&lt;/P&gt;</description>
      <pubDate>Sun, 20 Jul 2025 22:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311616#M597375</guid>
      <dc:creator>julian.bendix</dc:creator>
      <dc:date>2025-07-20T22:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Unauthenticated Remote Code Execution Vulnerabilities</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311657#M597382</link>
      <description>&lt;P&gt;I totally understand customer point of view, but being security product, they may have found later security vulnerability , they release patch, this what software industry, since as a consumer we expect fast phasing new feature every when and then.&lt;/P&gt;
&lt;P&gt;patch not much time to apply, but planning is takes time and if this is single node required small maintenance window, if the deployment is distributed&amp;nbsp; then you have better options.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jul 2025 07:01:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311657#M597382</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-07-21T07:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Unauthenticated Remote Code Execution Vulnerabilities</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311871#M597390</link>
      <description>&lt;P&gt;No hotfix, just a patch upgrade.... sigh...&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jul 2025 13:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-unauthenticated-remote-code-execution-vulnerabilities/m-p/5311871#M597390</guid>
      <dc:creator>WLRK.Infrastructure</dc:creator>
      <dc:date>2025-07-21T13:24:30Z</dc:date>
    </item>
  </channel>
</rss>

