Lucene search

K
cveCiscoCVE-2021-1412
HistoryFeb 17, 2021 - 5:15 p.m.

CVE-2021-1412

2021-02-1717:15:13
CWE-266
cisco
web.nvd.nist.gov
38
4
cve-2021-1412
cisco
identity services engine
ise
vulnerabilities
admin portal
sensitive information
remote attacker
nvd

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

44.3%

Multiple vulnerabilities in the Admin portal of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information. These vulnerabilities are due to improper enforcement of administrator privilege levels for sensitive data. An attacker with read-only administrator access to the Admin portal could exploit these vulnerabilities by browsing to one of the pages that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system. For more information about these vulnerabilities, see the Details section of this advisory.

Affected configurations

Nvd
Node
ciscoidentity_services_engineRange<2.3.0
OR
ciscoidentity_services_engineMatch2.3.0-
OR
ciscoidentity_services_engineMatch2.3.0patch1
OR
ciscoidentity_services_engineMatch2.3.0patch2
OR
ciscoidentity_services_engineMatch2.3.0patch3
OR
ciscoidentity_services_engineMatch2.3.0patch4
OR
ciscoidentity_services_engineMatch2.3.0patch5
OR
ciscoidentity_services_engineMatch2.3.0patch6
OR
ciscoidentity_services_engineMatch2.3.0patch7
OR
ciscoidentity_services_engineMatch2.4.0-
OR
ciscoidentity_services_engineMatch2.4.0patch1
OR
ciscoidentity_services_engineMatch2.4.0patch10
OR
ciscoidentity_services_engineMatch2.4.0patch11
OR
ciscoidentity_services_engineMatch2.4.0patch12
OR
ciscoidentity_services_engineMatch2.4.0patch13
OR
ciscoidentity_services_engineMatch2.4.0patch2
OR
ciscoidentity_services_engineMatch2.4.0patch3
OR
ciscoidentity_services_engineMatch2.4.0patch4
OR
ciscoidentity_services_engineMatch2.4.0patch5
OR
ciscoidentity_services_engineMatch2.4.0patch6
OR
ciscoidentity_services_engineMatch2.4.0patch7
OR
ciscoidentity_services_engineMatch2.4.0patch8
OR
ciscoidentity_services_engineMatch2.4.0patch9
OR
ciscoidentity_services_engineMatch2.6.0-
OR
ciscoidentity_services_engineMatch2.6.0patch1
OR
ciscoidentity_services_engineMatch2.6.0patch2
OR
ciscoidentity_services_engineMatch2.6.0patch3
OR
ciscoidentity_services_engineMatch2.6.0patch5
OR
ciscoidentity_services_engineMatch2.6.0patch6
OR
ciscoidentity_services_engineMatch2.6.0patch7
OR
ciscoidentity_services_engineMatch2.6.0patch8
OR
ciscoidentity_services_engineMatch2.7.0-
OR
ciscoidentity_services_engineMatch2.7.0patch2
OR
ciscoidentity_services_engineMatch3.0.0-
OR
ciscoidentity_services_engineMatch3.0.0patch1
VendorProductVersionCPE
ciscoidentity_services_engine*cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*
ciscoidentity_services_engine2.3.0cpe:2.3:a:cisco:identity_services_engine:2.3.0:-:*:*:*:*:*:*
ciscoidentity_services_engine2.3.0cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch1:*:*:*:*:*:*
ciscoidentity_services_engine2.3.0cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch2:*:*:*:*:*:*
ciscoidentity_services_engine2.3.0cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch3:*:*:*:*:*:*
ciscoidentity_services_engine2.3.0cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch4:*:*:*:*:*:*
ciscoidentity_services_engine2.3.0cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch5:*:*:*:*:*:*
ciscoidentity_services_engine2.3.0cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch6:*:*:*:*:*:*
ciscoidentity_services_engine2.3.0cpe:2.3:a:cisco:identity_services_engine:2.3.0:patch7:*:*:*:*:*:*
ciscoidentity_services_engine2.4.0cpe:2.3:a:cisco:identity_services_engine:2.4.0:-:*:*:*:*:*:*
Rows per page:
1-10 of 351

CNA Affected

[
  {
    "product": "Cisco Identity Services Engine Software",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

Social References

More

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

44.3%

Related for CVE-2021-1412