CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
29.8%
A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to upload malicious files to the web root of the application. This vulnerability is due to insufficient file input validation. An attacker could exploit this vulnerability by uploading a malicious file to the web interface. A successful exploit could allow the attacker to replace files and gain access to sensitive server-side information.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | identity_services_engine | 3.0.0 | cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:* |
cisco | identity_services_engine | 3.0.0 | cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:* |
cisco | identity_services_engine | 3.0.0 | cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:* |
cisco | identity_services_engine | 3.0.0 | cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:* |
cisco | identity_services_engine | 3.0.0 | cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:* |
cisco | identity_services_engine | 3.0.0 | cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:* |
cisco | identity_services_engine | 3.0.0 | cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:* |
cisco | identity_services_engine | 3.0.0 | cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch7:*:*:*:*:*:* |
cisco | identity_services_engine | 3.1 | cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:* |
cisco | identity_services_engine | 3.1 | cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:* |
[
{
"vendor": "Cisco",
"product": "Cisco Identity Services Engine Software",
"versions": [
{
"version": "3.0.0",
"status": "affected"
},
{
"version": "3.0.0 p1",
"status": "affected"
},
{
"version": "3.0.0 p2",
"status": "affected"
},
{
"version": "3.0.0 p3",
"status": "affected"
},
{
"version": "3.0.0 p4",
"status": "affected"
},
{
"version": "3.0.0 p5",
"status": "affected"
},
{
"version": "3.0.0 p6",
"status": "affected"
},
{
"version": "3.0.0 p7",
"status": "affected"
},
{
"version": "3.1.0",
"status": "affected"
},
{
"version": "3.1.0 p1",
"status": "affected"
},
{
"version": "3.1.0 p3",
"status": "affected"
},
{
"version": "3.1.0 p4",
"status": "affected"
}
]
}
]