First published: Sun Jan 26 2020(Updated: )
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access sensitive information related to the device. The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to sensitive information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | =2.2 | |
Cisco Identity Services Engine | =2.2\(0.470\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15255 has a medium severity rating according to the CVSS scoring system.
To fix CVE-2019-15255, you should upgrade to the latest version of Cisco Identity Services Engine that addresses this vulnerability.
The potential impacts of CVE-2019-15255 include unauthorized access to sensitive information within the Cisco Identity Services Engine.
CVE-2019-15255 affects users of Cisco Identity Services Engine version 2.2 and its specific release 2.2(0.470).
CVE-2019-15255 occurs due to inadequate sanitization within the web-based management interface, allowing attackers to bypass authorization.