First published: Thu Mar 08 2018(Updated: )
A vulnerability in certain CLI commands of Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to execute arbitrary commands on the host operating system with the privileges of the local user, aka Command Injection. These commands should have been restricted from this user. The vulnerability is due to insufficient input validation of CLI command user input. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a CLI command with crafted user input. A successful exploit could allow the attacker to execute arbitrary commands on the affected system that should be restricted. The attacker would need to have valid user credentials for the device. Cisco Bug IDs: CSCvf49844.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | =2.1\(102.103\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0214 has been rated with high severity due to its potential for command injection leading to arbitrary command execution.
To remediate CVE-2018-0214, upgrade to the latest patched version of Cisco Identity Services Engine that addresses the vulnerability.
CVE-2018-0214 affects users of Cisco Identity Services Engine version 2.1(102.103) and provides a potential vector for local authenticated attackers.
CVE-2018-0214 can allow authenticated local attackers to execute arbitrary commands on the host operating system, compromising system integrity.
While there are no specific reports of active exploitation, the high severity of CVE-2018-0214 suggests that systems should be updated promptly to prevent potential attacks.