A vulnerability in the External RESTful Services (ERS) API of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by persuading an authenticated administrator of the web-based management interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-twLnpy3M - Vendor Advisory | |
References | () https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-cross-site-scripting/ - |
16 Jan 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Oct 2022, 17:40
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-twLnpy3M - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CPE | cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:* |
26 Oct 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-26 15:15
Updated : 2024-11-21 06:43
NVD link : CVE-2022-20959
Mitre link : CVE-2022-20959
CVE.ORG link : CVE-2022-20959
JSON object : View
Products Affected
cisco
- identity_services_engine
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')