A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system.
This vulnerability is due to improper validation of user input within requests as part of the web-based management interface. An attacker could exploit this vulnerability by manipulating requests to the web-based management interface to contain operating system commands. A successful exploit could allow the attacker to execute arbitrary operating system commands on the underlying operating system with the privileges of the web services user.
Cisco has not yet released software updates that address this vulnerability.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx - Vendor Advisory | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
25 Jan 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jan 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-20 07:15
Updated : 2024-11-21 06:43
NVD link : CVE-2022-20964
Mitre link : CVE-2022-20964
CVE.ORG link : CVE-2022-20964
JSON object : View
Products Affected
cisco
- identity_services_engine
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')