
Immediate action is required for users of Cisco Identity Services Engine (ISE) and Cisco Catalyst Center (CCP). Critical security vulnerabilities affecting both products are currently under active exploitation in the wild, posing significant risks to network infrastructure. This development necessitates prompt attention from IT administrators and security teams responsible for these deployments.
Specifically, the vulnerability impacting Cisco ISE (versions 3.x) could potentially allow attackers to gain unauthorized access or execute malicious code. A separate, equally critical flaw in Cisco Catalyst Center (formerly Cisco DNA Center) is also being actively targeted, creating a direct path for attackers to potentially compromise control systems. These are not theoretical weaknesses; they are being leveraged in real-world attacks right now.
To protect networks and prevent potential breaches, it is absolutely critical to apply the vendor-provided security updates without delay. These patches directly address the exploited vulnerabilities and are the primary defense against ongoing attacks. Administrators should consult the official security advisories for definitive information on affected software versions, specific vulnerability details (including CVEs), and the precise steps for applying patches or implementing recommended mitigation strategies where patches are not immediately feasible. Prioritizing the patching of these exploited flaws is paramount for maintaining network security and integrity against known, active threats.
Source: https://www.bleepingcomputer.com/news/security/cisco-warns-of-ise-and-ccp-flaws-with-public-exploit-code/