A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device. This vulnerability is due to improper enforcement of administrative privilege levels for high-value sensitive data. An attacker with read-only Administrator privileges to the web-based management interface on an affected device could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-info-exp-YXAWYP3s - Vendor Advisory |
14 Apr 2022, 09:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch10:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:* |
|
CWE | CWE-269 | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.5 |
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-info-exp-YXAWYP3s - Vendor Advisory |
06 Apr 2022, 19:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-06 19:15
Updated : 2024-11-21 06:43
NVD link : CVE-2022-20782
Mitre link : CVE-2022-20782
CVE.ORG link : CVE-2022-20782
JSON object : View
Products Affected
cisco
- identity_services_engine