CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
54.6%
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access system files.
This vulnerability is due to improper access control in the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to list, download, and delete certain files that they should not have access to.
Cisco plans to release software updates that address this vulnerability.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx [βhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCxβ]
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | identity_services_engine | 3.1 | cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:* |
cisco | identity_services_engine | 3.1 | cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:* |
cisco | identity_services_engine | 3.1 | cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:* |
cisco | identity_services_engine | 3.1 | cpe:2.3:a:cisco:identity_services_engine:3.1:patch4:*:*:*:*:*:* |
cisco | identity_services_engine | 3.2 | cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:* |
[
{
"vendor": "Cisco",
"product": "Cisco Identity Services Engine Software",
"versions": [
{
"version": "3.1.0",
"status": "affected"
},
{
"version": "3.1.0 p1",
"status": "affected"
},
{
"version": "3.1.0 p3",
"status": "affected"
},
{
"version": "3.1.0 p4",
"status": "affected"
},
{
"version": "3.2.0",
"status": "affected"
}
]
}
]
More