A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access system files.
This vulnerability is due to improper access control in the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to list, download, and delete certain files that they should not have access to.
Cisco plans to release software updates that address this vulnerability.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx"]
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx - | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
25 Jan 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
16 Jan 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access system files. This vulnerability is due to improper access control in the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to list, download, and delete certain files that they should not have access to. Cisco plans to release software updates that address this vulnerability. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx"] |
08 Nov 2022, 15:54
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:cisco:identity_services_engine:3.1:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:* |
|
CWE | NVD-CWE-Other |
04 Nov 2022, 18:36
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-04 18:15
Updated : 2024-11-21 06:43
NVD link : CVE-2022-20956
Mitre link : CVE-2022-20956
CVE.ORG link : CVE-2022-20956
JSON object : View
Products Affected
cisco
- identity_services_engine
CWE