THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.
Affected Software Product | Affected Release | Affected Release Number | Comments |
---|---|---|---|
Identity Services Engine System Software | 2 | 2.0, 2.0.1, 2.1.0, 2.2.0, 2.3.0, 2.4.0, 2.6.0, 2.7.0 | 2.0: For ISE 2.X – all versions 2.0.1: For ISE 2.X – all versions 2.1.0: For ISE 2.X – all versions 2.2.0: For ISE 2.X – all versions 2.3.0: For ISE 2.X – all versions 2.4.0: For ISE 2.X – all versions 2.6.0: For ISE 2.X – all versions 2.7.0: For ISE 2.X – all versions |
Identity Services Engine System Software | 3 | 3.0.0, 3.1.0 | 3.0.0: For ISE 3.X - all versions 3.1.0: For ISE 3.X - all versions |
Defect ID | Headline |
CSCvz97194 | WMI Providers Not Working after Windows DCOM Server Hardening for CVE-2021-26414 |
Cisco Identity Services Engine (ISE) Passive Identity (Passive ID) services that use the Windows Management Instrumentation (WMI) provider will fail after Windows Server KB500442 or later is installed.
The Distributed Component Object Model (DCOM) Remote Protocol is a protocol that is used in communication between the ISE Primary Passive ID node and the Domain Controller that shares the authentication events with Cisco ISE. Hardening changes in DCOM through Windows Server KB500442 or later were required to address vulnerability CVE-2021-26414. After the vulnerability is fixed, Cisco ISE will lack permissions to fetch the specific Kerberos events that are necessary for Passive ID services when the WMI provider is used.
After any Windows Server update that contains the fix for CVE-2021-26414 is installed, Passive ID services that use the WMI provider will fail. The domain controller side will display an error message similar to this:
Next error: “The server-side authentication level policy does not allow the user DOMAIN\username SID (S-X-X-X-X-X-X-X) from address xxx.xxx.xxx.xxx to activate DCOM server. Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application”
In order to resolve this issue, Cisco recommends to migrate Passive ID connections that use the WMI provider to EVT-based PIC Agent. EVT-based PIC Agent is available in Cisco ISE Release 3.0 and later.
For instructions on how to configure EVT-based PIC Agent, see Configure EVT-Based Identity Services Engine Passive ID Agent.
Additionally, PIC Agent for Cisco ISE 2.7 and earlier will continue to work if installed on a domain controller.
If EasyConnect is in use, Cisco ISE needs to be patched to one of the following releases to support EasyConnect with PIC Agent. If not patched, Cisco ISE only supports EasyConnect with the WMI provider.
In order to detect EasyConnect use cases, choose Policy > Policy Sets
and inspect each authorization policy in each policy set for these conditions:
Version | Description | Section | Date |
1.2 | Updated the Workaround/Solution section. | Workaround/Solution | 2023-DEC-12 |
1.1 | Updated the Workaround/Solution section. | Workaround/Solution | 2023-APR-10 |
1.0 | Initial Release | — | 2022-AUG-18 |
For further assistance or for more information about this field notice, contact the Cisco Technical Assistance Center (TAC) using one of the following methods:
To receive email updates about Field Notices (reliability and safety issues), Security Advisories (network security issues), and end-of-life announcements for specific Cisco products, set up a profile in My Notifications
Unleash the Power of TAC's Virtual Assistance