Hi Community,
During a recent VAPT assessment, the SSH Prefix Truncation Vulnerability (Terrapin) — CVE-2023-48795 — was flagged on our Cisco ISE deployment (version 3.3 Patch 4).
I have checked Cisco’s official vulnerability repository, and the status for this CVE currently shows as "Under Investigation":
Cisco Security Advisory for CVE-2023-48795

As this is a compliance priority, I’m looking for any recommended workaround or guidance to remediate or mitigate this vulnerability until an official fix is released. I’ve gone through the admin guides and release notes, but couldn't find any specific instructions related to disabling vulnerable SSH algorithms or hardening SSH configs on ISE.
Has anyone successfully addressed or suppressed this VAPT finding for Cisco ISE? Any help, workaround, or clarification from Cisco TAC or the community would be highly appreciated.
Thanks in advance.