First published: Wed Oct 06 2021(Updated: )
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to access sensitive information or conduct a server-side request forgery (SSRF) attack through an affected device. This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by uploading a crafted XML file that contains references to external entities. A successful exploit could allow the attacker to retrieve files from the local system, resulting in the disclosure of sensitive information, or cause the web application to perform arbitrary HTTP requests on behalf of the attacker.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | <=3.1 | |
Cisco Identity Services Engine | =3.1\(0.518\) | |
Cisco Identity Services Engine | =3.2\(0.149\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34706 is a vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE).
CVE-2021-34706 allows an authenticated, remote attacker to access sensitive information or conduct a server-side request forgery (SSRF) attack through an affected device.
The severity of CVE-2021-34706 is medium, with a CVSS severity score of 5.4.
To fix CVE-2021-34706, Cisco recommends upgrading to a fixed version of Cisco Identity Services Engine (ISE) that addresses the vulnerability.
You can find more information about CVE-2021-34706 in the Cisco Security Advisory at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-V4VSjEsX.