<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Vulnerabilities Archives - Secure Africa 2026 Summit</title>
	<atom:link href="https://secureafricasummit.com/category/vulnerabilities/feed/" rel="self" type="application/rss+xml" />
	<link>https://secureafricasummit.com/category/vulnerabilities/</link>
	<description>Cybersecurity &#38; AI Summit in Nairobi, Kenya</description>
	<lastBuildDate>Sat, 07 Jun 2025 07:05:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://secureafricasummit.com/wp-content/uploads/2025/05/cropped-BluChip-Logo-32x32.png</url>
	<title>Vulnerabilities Archives - Secure Africa 2026 Summit</title>
	<link>https://secureafricasummit.com/category/vulnerabilities/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cisco Releases Updates Addressing Critical Vulnerability in Identity Services Engine</title>
		<link>https://secureafricasummit.com/cisco-releases-updates-to-address-critical-vulnerability/</link>
		
		<dc:creator><![CDATA[Secure Africa]]></dc:creator>
		<pubDate>Fri, 06 Jun 2025 06:50:39 +0000</pubDate>
				<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">http://localhost/projects/wp/exhibz/?p=361</guid>

					<description><![CDATA[<p>On Wednesday, June 4, Cisco released updates to address a hard-coded password issue that affects Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE). According to Cisco&#8217;s advisory, the flaw could be exploited to &#8220;allow an unauthenticated, remote attacker to access sensitive data, execute limited [&#8230;]</p>
<p>The post <a href="https://secureafricasummit.com/cisco-releases-updates-to-address-critical-vulnerability/">Cisco Releases Updates Addressing Critical Vulnerability in Identity Services Engine</a> appeared first on <a href="https://secureafricasummit.com">Secure Africa 2026 Summit</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div>On Wednesday, June 4, Cisco released updates to address a hard-coded password issue that affects Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE). According to Cisco&#8217;s advisory, the flaw could be exploited to &#8220;allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.&#8221; The vulnerability affects Cisco ISE 3.1, 3.2, 3.3, and 3.4 deployed on AWS, Cisco 3.2, 3.3, and 3.4 deployed on Azure, and Cisco 3.2, 3.3, and 3.4 deployed on OCI.<br /> </div>
<div><b>Editor&#8217;s Note</b><br /><br /><span style="color: 878b8f;">[<a title="Lee Neely" href="https://click.email.sans.org/?qs=dc2825e6a0a50bd8da21452d3b50bb45a65ac85994ab5c971369ce86c3cb6b80387b3ce54c983104591f0a56ebe17b2af51849296e98b71c" target="_blank" rel="noopener">Neely</a>]</span><br />The cloud deployment of ISE generates credentials on install in each cloud environment. The flaw is that static credentials are the same for each product on the same platform, meaning all installs of ICE version 3.1 in AWS have the same generated credentials. There is a POC exploit. The fix is to update ICE and then run the reset application config command on the primary administration node to reset the passwords. Also apply ACLs limiting access to the administration interfaces. Read the Cisco advisory for caveats.</div>
<div><br /><b>Read more in:<br /><span style="color: 117db6;">&#8211;</span> <a title="Link" href="https://click.email.sans.org/?qs=dc2825e6a0a50bd89a0cca5e77bb3cda231ad9d7701d4e05119b6ba2a094b1138e25fcd46ad84cba006650d23adaa86284963ec1517c31f5" target="_blank" rel="noopener">thehackernews.com</a></b>: Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI<br /><b><span style="color: 117db6;">&#8211;</span> <a title="Link" href="https://click.email.sans.org/?qs=dc2825e6a0a50bd8b2f50ac0ed1e9e5d5ac604eae7f22f3b899e08147fb655ce02b71a4a54eccafe3ed2873ef43a08a23cfb7156c36b29a0" target="_blank" rel="noopener">sec.cloudapps.cisco.com</a></b>: Cisco Identity Services Engine on Cloud Platforms Static Credential Vulnerability<br /><b><span style="color: 117db6;">&#8211;</span> <a title="Link" href="https://click.email.sans.org/?qs=dc2825e6a0a50bd8b76aa5f5f58199b5090dee83e3bab59bfbdb5a5221cf2e53ce063a9b8fbb1e4f74c9ff0f45dcd3b9f55108d590e3b178" target="_blank" rel="noopener">nvd.nist.gov</a></b>: CVE-2025-20286 Detail</div>
<div> </div>
<div>
<div class="entry-content">
<article id="post-352" class=" post-details post-352 post type-post status-publish format-standard has-post-thumbnail hentry category-threat-intelligence tag-event tag-news">
<div class="post-body clearfix">
<div class="entry-content clearfix">
<div>This Article was featured on SAN’s newsletter of June 6, 2025  Vol. 27, Num. 43</div>
</div>
</div>
</article>
</div>
<footer class="entry-footer clearfix">
<div class="post-tag-container"> </div>
</footer></div>
<p>The post <a href="https://secureafricasummit.com/cisco-releases-updates-to-address-critical-vulnerability/">Cisco Releases Updates Addressing Critical Vulnerability in Identity Services Engine</a> appeared first on <a href="https://secureafricasummit.com">Secure Africa 2026 Summit</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
