Posted in

Cisco ISE Vulnerability CVE-2024-20399: RADIUS Flaw Causes System Crashes

A newly disclosed critical vulnerability in Cisco Identity Services Engine (ISE) could let remote attackers crash systems and cause widespread network disruptions. Tracked as CVE-2024-20399, the flaw carries a CVSS v3.1 score of 7.5 and affects Cisco ISE versions 3.4.0 through 3.4 Patch 3.

What Causes the Cisco ISE RADIUS Vulnerability?

The issue stems from how Cisco ISE handles repeated authentication failures from endpoints previously marked as rejected. When attackers send a crafted series of RADIUS access requests targeting these blocked endpoints, it triggers a denial-of-service (DoS) condition.

The result? The ISE system crashes and restarts unexpectedly — disrupting authentication, access control, and compliance enforcement across the entire network.

Why This Flaw Is Dangerous

This vulnerability doesn’t require any valid credentials. That means anyone with network access can exploit it remotely by sending malicious RADIUS requests.
Because Cisco ISE is a central component for network access control and device authentication, an unexpected restart can temporarily block all user authentications — creating a chain reaction of service outages and visibility loss across connected systems.

Affected Cisco ISE Versions

CVE IDProductAffected VersionsCVSS ScoreType
CVE-2024-20399Cisco ISE3.4.0, 3.4 P1, 3.4 P2, 3.4 P37.5Denial of Service (DoS)

Cisco confirmed that this issue affects only ISE 3.4.x versions up to Patch 3, where the following setting is enabled by default:

“Reject RADIUS requests from clients with repeated failures”

Earlier versions (3.3 and below) and newer releases (3.5 and later) are not affected.

How to Protect Your Network

Cisco has released a fix and multiple mitigation options to address the issue. Administrators should take these immediate steps:

  1. Disable the vulnerable setting
    • Navigate to:
      Administration > System > Settings > Protocols > RADIUS
    • Temporarily disable the “Reject RADIUS requests from clients with repeated failures” option.
  2. Upgrade to a safe version
    • Apply Patch 4 or upgrade to Cisco ISE 3.5 or later.
    • Once patched, re-enable the RADIUS rejection setting to restore normal protection.
  3. Monitor for abnormal RADIUS activity
    • Watch for spikes in authentication failures or repeated access requests targeting blocked MAC addresses.

Final Thoughts

The Cisco ISE CVE-2024-20399 vulnerability highlights how a simple logic flaw in RADIUS handling can lead to major operational disruptions. Organizations relying on Cisco ISE for network security and access control should immediately disable the vulnerable configuration and plan for patching to prevent potential denial-of-service attacks.


Leave a Reply

Your email address will not be published. Required fields are marked *