Cisco ISE 3.3 Patch 3 still reports as vulnerable. I even tried installing the 3.2 hotfix to get this remediated, but without success.
We need a fix as we need to close this vulnerability.
If this isn't addressed in a version upgrade or patch soon (running ISE 3.2 patch 4 at this time), it would be nice to at least have a hot patch to resolve, so rebuilds can be done and end in a secure set-up without engaging TAC.
As we move back to the office, there is a need to update our guest access. As part of that, the look and feel needs to match the current corporate standards. The first ask is the ability to use downloadable fonts. I have multiple files and they a...
On Cisco Identity Services Engine Data SheetCisco Identity Services Engine Data Sheet There is an error in the licensing section: It's not the end of the world, but it is wrong.Cisco ISE Licensing Overview Figure 1 is wrong.The color for Premier ...
Answer from Cisco TAC for Cisco ISE 3.3 with Patch 3"The vulnerability is fixed on 3.3 patch 3. So, you should be good on version 3.3 patch 3. if the vulnerability scanner still flags ISE on 3.3 patch 3 is because it is using a variation of OpenSSH 9...
Got the TAC case, but 2 days without any update. I was wondering if anyone else is going through this.I think my best option to meet my company deadlines if I don't hear back is to turn off ssh, which is not a great option, but I'm not in a rush to ...
Seeing this error on ISE 3.3 patch 2. It's the first weekend with four servers running that version. The entire set does reboot over the weekend, so it and some other errors may be related to that, but the same servers never reported some of the e...
While I have implemented time conditions and used them successfully, our servers and network are set to UTC, so I'm not 100% sure where they actually come from, but I always assumed is was the ISE Servers, since that's the place where my policy is ev...