First published: Fri Nov 06 2020(Updated: )
A vulnerability in the Microsoft Active Directory integration of Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker would need to have a valid administrator account on an affected device. The vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to the system with a crafted Active Directory account. A successful exploit could allow the attacker to obtain root privileges on an affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine (ISE) | <3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27122 has been classified with a high severity rating due to its potential for privilege escalation.
To fix CVE-2020-27122, you should upgrade Cisco Identity Services Engine to the latest patched version available.
CVE-2020-27122 affects users of Cisco Identity Services Engine versions prior to 3.0.0.
CVE-2020-27122 cannot be exploited remotely and requires an authenticated local attacker with administrator access.
CVE-2020-27122 enables authenticated users to elevate their privileges on the affected device.