First published: Thu Feb 21 2019(Updated: )
A vulnerability in the Identity Services Engine (ISE) integration feature of Cisco Prime Infrastructure (PI) could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack against the Secure Sockets Layer (SSL) tunnel established between ISE and PI. The vulnerability is due to improper validation of the server SSL certificate when establishing the SSL tunnel with ISE. An attacker could exploit this vulnerability by using a crafted SSL certificate and could then intercept communications between the ISE and PI. A successful exploit could allow the attacker to view and alter potentially sensitive information that the ISE maintains about clients that are connected to the network. This vulnerability affects Cisco Prime Infrastructure Software Releases 2.2 through 3.4.0 when the PI server is integrated with ISE, which is disabled by default.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Infrastructure | >=2.2<=3.4.0 | |
>=2.2<=3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-1659.
The severity of CVE-2019-1659 is high with a CVSS score of 7.4.
The affected software for CVE-2019-1659 is Cisco Prime Infrastructure version 2.2 to 3.4.0.
The vulnerability allows an unauthenticated, remote attacker to perform a man-in-the-middle attack against the SSL tunnel between Identity Services Engine (ISE) and Cisco Prime Infrastructure (PI).
Cisco has released a security advisory that provides information on how to mitigate the vulnerability in Cisco Prime Infrastructure. Please refer to the Cisco Security Advisory for more details.