...
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2023-48795 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795
workaround for ISE <=3.1 --------------------------------- for example below cipher is vulnerable cipher 1. chacha20-poly1305@openssh.com if we want to disable the cipher chacha20-poly1305@openssh.com follow the below. ise31/admin# configure terminal Enter configuration commands, one per line. End with CNTL/Z. ise31/admin(config)# no service sshd encryption-algorithm chacha20-poly1305@openssh.com ise31/admin# end ise31/admin# copy running-config startup-config workaround for ISE > 3.1 -------------------------------- for example below cipher is vulnerable cipher 1. chacha20-poly1305@openssh.com if we want to disable the cipher chacha20-poly1305-openssh.com follow the below. ise32/admin# configure terminal Enter configuration commands, one per line. End with CNTL/Z. ise32/admin(config)# no service sshd encryption-algorithm ise32/admin(config)# service sshd encryption-algorithm aes128-cbc aes128-ctr aes128-gcm-openssh.com aes256-cbc aes256-ctr aes256-gcm-openssh.com ise32/admin# end check for workaround all versions ----------------------------------------- check that the correct cipher is removed and the other ciphers remain, do the following: ise/admin# show running-config | include sshd If no encryption-algorithm options are configured, then all ciphers will be allowed and this workaround will not be valid. If chacha20-poly1305@openssh.com is still configured as one of the encryption-algorithm options, then this vulnerability will still be present.
Additional details about the vulnerabilities listed above can be found at https://www.cve.org/.
The Cisco PSIRT has assigned this bug the following CVSS version 3.1 score. The Base CVSS score as of the time of evaluation is: 5.9 https://sec.cloudapps.cisco.com/security/center/cvssCalculator.x?version=3.1&vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVE ID CVE-2023-48795 have been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html