Start your free trial today.
Protect your organization with cutting-edge cybersecurity solutions designed for resilience and efficiency. Secure your digital assets with confidence.
Your Shield Against Threats
Unleash the Power of Cybersecurity
Boost Your Security, Enhance Your Business
We solve Your Cyber Challenges
Quick Links
Resources
Deepaegis Portals
2025 Deepaegis. All Rights Reserved.
A vulnerability in cloud deployments (AWS, Azure, OCI) of Cisco Identity Services Engine (ISE) exists due to the improper generation of credentials, resulting in identical credentials across multiple ISE instances of the same release and platform. An unauthenticated, remote attacker could exploit this flaw to access sensitive data, perform limited administrative actions, modify system configurations, or disrupt services.
Successful exploitation could result in an attacker extracting static cloud-deployed Cisco ISE credentials from one instance and using them to compromise other instances of Cisco ISE cloud deployments sharing the same credentials. This can lead to unauthorized system configuration changes, data exposure, or service disruption.
Cisco Identity Services Engine (ISE) Cloud Deployments (AWS, Microsoft Azure, Oracle Cloud Infrastructure)
Remediation: Cisco has released updated guidance and fixes to address this issue: Cloud deployments of Cisco ISE must ensure that unique credentials are generated per instance. Customers are advised to follow the remediation recommendations published in Cisco Security Advisory cisco-sa-ise-aws-static-cred-FPMjUcm7.
Exploit Added Date: 6/3/2025
Cisco recommends updating affected cloud deployments following their latest cloud-specific configuration and credential generation procedures.
None available.
Re-deploy cloud ISE instances ensuring unique credentials. Monitor access logs for unauthorized or unexpected administrative activities. Restrict network port access where possible.
Scan for identical credentials across cloud ISE deployments. Monitor cloud logs for unauthorized or cross-instance access attempts.
6/3/2025
6/3/2025
No references provided
No affected organizations specified
This document contains sensitive information. Unauthorized distribution is prohibited.