cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

Who Me Too'd this topic

ISE vulnerability CSCvd49829 (Apache Struts2 Jakarta Multipart Parser File Upload Code Execution Vulnerability )

fechao
Cisco Employee
Cisco Employee

Hi expert,

I got an query from our ISE end user on the below vulerability:  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170310-struts2

but there are some quesitons I need to confirm with you:

1. in the vulnerability, I can see it listed as "Exposure is not configuration dependent.", so even the customer didn't configure guest portal/MyDevice portal, it is still vulnerable, right?

2. customer said they didn't want to install the patch as a permanent fix, instead, they want to check if there is anything they can do on their Firewall to block the attack to ISE on this vulerability, for example, to block the HTTP request to our ISE, for example, port 443/8443, is that OK? if it is OK, which ports we need to block?

Thank you very much!

Who Me Too'd this topic