cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
9834
Views
13
Helpful
8
Replies

Cisco ISE with AD CVE-2022-38023 patch

andrewswanson
Level 7
Level 7

Hi

I have an ISE 2.7 patch 7 distributed deployment that is bound to AD.

AD was recently patched with regards to CVE-2022-38023. Since then, the AD admins are reporting that the PSNs are appearing in their logs every few hours with "The Netlogon service encountered a client using RPC signing instead of RPC sealing)."

I've tried to replicate the issue with a Test User Authentication from ISE with Authentication Type set to Kerberos but this doesn't appear in the AD logs with the error. Has anyone else experienced this behaviour with ISE and AD patched for CVE-2022-38023?

Thanks
Andy

 


Microsoft Knowledgebase on issue is below:

https://support.microsoft.com/en-us/topic/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25

 

8 Replies 8

andrewswanson
Level 7
Level 7

The AD admins confirmed that the PSN generated event ID in their logs was actually:

event id: 5840: The Netlogon service created a secure channel with a client with RC4.


I found the following cisco ISE bug:

https://bst.cisco.com/bugsearch/bug/CSCvv82074

 

From my reading of both the Cisco bug and the MS knowledgebase article, it looks like I'll run into the Cisco bug when the AD CVE-2022-38023 patch goes into its enforcement phase in April 2023. I've opened a TAC case to confirm.

Andy

Hi

I disabled RC4 in AD object for one of my ISE but eventID 5840: The Netlogon service created a secure channel with a client with RC4. still are generating. 
ISE version 003.000(000.458)

 

Krzysztof

andrewswanson
Level 7
Level 7

Contacted TAC - Cisco were already aware of this issue. Enhancement below was logged to deal with this.

https://bst.cisco.com/bugsearch/bug/CSCvo60450

ISE 2.x currently only supports RC4 with AD - the above enhancement changes this to AES256. Will probably upgrade to ISE 3.x rather than wait for the 2.x patch.

Andy

Thanks for the clarification and links - much appreciated.

Andy

Hi hslai,

so if I understand it correctly. The Cisco ISE 2.7 (Patch8 in my Case) should still be able to communicate with the AD if the AD-Element uses the AES etype and tells the ISE to comunicate with it ?

 

Kind Regards

 

samdejongh
Level 1
Level 1

Hi andrewswanson,

We have the exact same issue as reported above, I've see the link to this bug : https://bst.cisco.com/bugsearch/bug/CSCvo60450

But as far as I can tell there is no version of ISE that is currently listed as a known fixed release. How did you manage to get this resolved?

Many thanks in advance.

 

andrewswanson
Level 7
Level 7

Hi - Still not resolved this as TAC recommended to upgrade to 3.X. will hopefully get this done in the next few months.

cheers

Andy

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: