5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
29.6%
A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to take privileges actions within the web-based management interface.
This vulnerability is due to improper access control on a feature within the web-based management interface of the affected system. An attacker could exploit this vulnerability by accessing features through direct requests, bypassing checks within the application. A successful exploit could allow the attacker to take privileged actions within the web-based management interface that should be otherwise restricted.
{{value}} [ā%7b%7bvalue%7d%7dā])}]]
[
{
"vendor": "Cisco",
"product": "Cisco Identity Services Engine Software",
"versions": [
{
"version": "2.6.0",
"status": "affected"
},
{
"version": "2.6.0 p1",
"status": "affected"
},
{
"version": "2.6.0 p2",
"status": "affected"
},
{
"version": "2.6.0 p3",
"status": "affected"
},
{
"version": "2.6.0 p5",
"status": "affected"
},
{
"version": "2.6.0 p6",
"status": "affected"
},
{
"version": "2.6.0 p7",
"status": "affected"
},
{
"version": "2.6.0 p8",
"status": "affected"
},
{
"version": "2.6.0 p9",
"status": "affected"
},
{
"version": "2.6.0 p10",
"status": "affected"
},
{
"version": "2.6.0 p11",
"status": "affected"
},
{
"version": "2.6.0 p12",
"status": "affected"
},
{
"version": "2.7.0",
"status": "affected"
},
{
"version": "2.7.0 p1",
"status": "affected"
},
{
"version": "2.7.0 p2",
"status": "affected"
},
{
"version": "2.7.0 p3",
"status": "affected"
},
{
"version": "2.7.0 p4",
"status": "affected"
},
{
"version": "2.7.0 p5",
"status": "affected"
},
{
"version": "2.7.0 p6",
"status": "affected"
},
{
"version": "2.7.0 p7",
"status": "affected"
},
{
"version": "3.0.0",
"status": "affected"
},
{
"version": "3.0.0 p1",
"status": "affected"
},
{
"version": "3.0.0 p2",
"status": "affected"
},
{
"version": "3.0.0 p3",
"status": "affected"
},
{
"version": "3.0.0 p4",
"status": "affected"
},
{
"version": "3.0.0 p5",
"status": "affected"
},
{
"version": "3.0.0 p6",
"status": "affected"
},
{
"version": "3.1.0",
"status": "affected"
},
{
"version": "3.1.0 p1",
"status": "affected"
},
{
"version": "3.1.0 p3",
"status": "affected"
},
{
"version": "3.1.0 p4",
"status": "affected"
},
{
"version": "3.1.0 p5",
"status": "affected"
},
{
"version": "3.2.0",
"status": "affected"
}
]
}
]
More
5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
29.6%