cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2760
Views
13
Helpful
8
Comments

 

The Portuguese version of this Article can be found at: ISE - Field Notice: FN74227 - Software Upgrade Recomendado .

 

MarceloMorais_0-1654436644727.png For an offline or printed copy of this document, simply choose ⋮ Options > Printer Friendly Page. You may then Print > Print to PDF or Copy & Paste to any other document format you like.

 

Introduction

Please note the following Field Notice

FN74227 of January 8, 2025

described in:

Field Notice: FN74227 - Cisco ISE: Authentication and Certificate-Based Logins Will Fail Due to Microsoft Intune Security Identifier Changes - Software Upgrade Recommended

CSCwk73785 Certificate Based Authentication with SID - Security Identifiers

 

Summary

Cisco ISE supports Certificate-based Authentication with Endpoints. Microsoft recently announced that there have been changes to Windows behavior that mitigate Certificate Spoofing. These changes will impact Cisco ISE Authentication capabilities. Certificate-based Logins will fail for Users or Devices in Local Active Directory and Microsoft Intune Mobile Device Management (MDM) integration when Windows enforces strong mapping on Feb 11, 2025.

 

Note: For the affected Use Cases where Authentication is performed using GUID-Embedded Certificates, Cisco ISE must be upgraded to one of the recommended versions. These Cisco ISE releases comply with the newer GUID format proposed by Microsoft Intune.

 

Workaround

There is no Workaround that will solve this vulnerability!!!

 

Affected Products & Fixed Software

The vulnerability affects Cisco ISE in the following versions:

Field Notice FN74227 - Cisco ISE.png

 

To access the Cisco ISE version that fixes this Field Notice:

 

 

Hope this helps !!!

Comments

ótimo trabalho,  muito útil assim nos da subsídios pra atualizar o mais rápido possível 

@Adonay dos Anjos ... thanks !!!

Martin L
VIP
VIP

Interesting...thanks for sharing!

@Martin L ... thanks a lot !!!

Shorty
Level 1
Level 1

I opened a case with TAC on this but all they're saying is that I need to upgrade to 3.2 Patch 7 to avoid issues.

 

But Microsoft's KB article (KB5014754: Certificate-based authentication changes on Windows domain controllers - Microsoft Support) states that after February 2025, weak mapping will prevent users from authenticating - and all of the attributes available in ISE, including Subject Alternative Name, are considered weak. This is even detailed in the Cisco Field Notice on this issue "...After the changes introduced by Microsoft (KB5014754), endpoint authentication may fail when SAN is used for identity lookups against Active Directory."

 

So is there something else that needs to be done here? Based on Microsoft's KB article, it seems like authentication will break against AD even if you are patched to the appropriate ISE version. 

Shorty
Level 1
Level 1

My worry is that this Field Notices focuses heavily on InTune URI's and GUID's but does not adequately address scenarios where certificates are authenticated against Active Directory only (no InTune). 

 

The Work Around / Solution, and Additional Information sections, only deal with InTune deployed certificates. 

 

The Field Notice glosses over Active Directory. They mention this:

 

"Certificate attribute lookups against external identity stores: When endpoints authenticate using certificate-based EAP authentication, Cisco ISE allows certificate attributes to be matched using Certificate Authentication Profiles. After the changes introduced by Microsoft, endpoint authentication may fail when SAN is used for identity lookups against Active Directory."

 

And that's it. No workaround or solution for people using SANs against Active Directory with their Certificate Profile. 

 

Microsoft's KB article is alarming. If you don't enable compatibility mode before February 2025, I feel that this may have impact for a lot of people even if you're on the appropriately patched version of ISE. 

 

Acording to Microsoft: "Unless updated to Audit mode or Enforcement mode by using the StrongCertificateBindingEnforcement registry key earlier, domain controllers will move to Full Enforcement mode when the February 2025 Windows security update is installed. Authentication will be denied if a certificate cannot be strongly mapped. The option to move back to Compatibility mode will remain until September 2025. After this date, the StrongCertificateBindingEnforcement registry key will no longer be supported"

stayd
Level 1
Level 1

Hi Shorty, I am also seriously worried regarding this field notice. I am happy that Cisco informed about this, this is fine. Thank you.

But information withing field notice is not clear.

CSCwk73785 contains 2 conditions. After reading at least I understand these conditions are in OR-relationship not AND.

So why FN is describing more the second condition and the first one "not strongly mapped to Active Directory (AD), certificate-based login for users and/or devices on the local AD will fail when Microsoft Windows enforces strong mapping from Feb 11, 2025" is not taken to serious attention.

As it is written like this I understand no mather what you are doing with Cisco ISE, it depends more from how Windows OS will start behave from 11.2.2025. It seems to me, this is more about Windows Domain Controllers and Windows endpoint devices.

Where is the connection to Authenticator ?

OR MS is speaking just about their NPS(radius) ?

There is still a lot of FOG around this issue.

To a better understand of this issue, please take a look at Impact of Microsoft KB5014754 with ISE and EAP-TLS authentication, search for @Greg Gibbs excellent explanation.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: