First published: Wed Jan 18 2023(Updated: )
A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface. This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks. Cisco has not yet released software updates that address this vulnerability.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | <2.6.0 | |
Cisco Identity Services Engine | =2.6.0 | |
Cisco Identity Services Engine | =2.6.0-patch1 | |
Cisco Identity Services Engine | =2.6.0-patch10 | |
Cisco Identity Services Engine | =2.6.0-patch11 | |
Cisco Identity Services Engine | =2.6.0-patch12 | |
Cisco Identity Services Engine | =2.6.0-patch2 | |
Cisco Identity Services Engine | =2.6.0-patch3 | |
Cisco Identity Services Engine | =2.6.0-patch5 | |
Cisco Identity Services Engine | =2.6.0-patch6 | |
Cisco Identity Services Engine | =2.6.0-patch7 | |
Cisco Identity Services Engine | =2.6.0-patch8 | |
Cisco Identity Services Engine | =2.6.0-patch9 | |
Cisco Identity Services Engine | =2.7.0 | |
Cisco Identity Services Engine | =2.7.0-patch1 | |
Cisco Identity Services Engine | =2.7.0-patch2 | |
Cisco Identity Services Engine | =2.7.0-patch3 | |
Cisco Identity Services Engine | =2.7.0-patch4 | |
Cisco Identity Services Engine | =2.7.0-patch5 | |
Cisco Identity Services Engine | =2.7.0-patch6 | |
Cisco Identity Services Engine | =2.7.0-patch7 | |
Cisco Identity Services Engine | =3.0.0 | |
Cisco Identity Services Engine | =3.0.0-patch1 | |
Cisco Identity Services Engine | =3.0.0-patch2 | |
Cisco Identity Services Engine | =3.0.0-patch3 | |
Cisco Identity Services Engine | =3.0.0-patch4 | |
Cisco Identity Services Engine | =3.0.0-patch5 | |
Cisco Identity Services Engine | =3.0.0-patch6 | |
Cisco Identity Services Engine | =3.1 | |
Cisco Identity Services Engine | =3.1-patch1 | |
Cisco Identity Services Engine | =3.1-patch3 | |
Cisco Identity Services Engine | =3.1-patch4 | |
Cisco Identity Services Engine | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-20966.
The severity of CVE-2022-20966 is medium, with a severity value of 5.4.
The affected software for CVE-2022-20966 is Cisco Identity Services Engine versions up to and including 2.6.0, including various patch versions.
The impact of CVE-2022-20966 is that an authenticated, remote attacker could conduct cross-site scripting attacks against other users of the application web-based management interface.
Yes, Cisco has released patches to address the vulnerability. Please refer to the Cisco Security Advisory for more information.