First published: Wed Feb 19 2020(Updated: )
A vulnerability in the logging component of Cisco Identity Services Engine could allow an unauthenticated remote attacker to conduct cross-site scripting attacks. The vulnerability is due to the improper validation of endpoint data stored in logs used by the web-based interface. An attacker could exploit this vulnerability by sending malicious endpoint data to the targeted system. An exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine (ISE) | =2.6.0-patch1 | |
Cisco Identity Services Engine (ISE) | =2.6.0-patch2 | |
Cisco Identity Services Engine (ISE) | =2.6.0-patch3 | |
Cisco Identity Services Engine (ISE) | =2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3156 is categorized as a high-severity vulnerability.
To fix CVE-2020-3156, you should apply the appropriate patches provided by Cisco for the affected versions of Identity Services Engine.
CVE-2020-3156 affects users of Cisco Identity Services Engine versions 2.6.0-patch1, 2.6.0-patch2, 2.6.0-patch3, and 2.7.
CVE-2020-3156 can potentially allow an unauthenticated remote attacker to conduct cross-site scripting attacks.
CVE-2020-3156 occurs due to improper validation of endpoint data stored in logs used by the web-based interface of the Cisco Identity Services Engine.