First published: Thu May 18 2023(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to download arbitrary files from the filesystem of an affected device. These vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to download arbitrary files from the underlying filesystem of the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | <=3.1 | |
Cisco Identity Services Engine | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20087 is medium with a CVSS score of 6.5.
Cisco Identity Services Engine is a web-based management interface for managing network access control and policy enforcement.
Affected software versions for CVE-2023-20087 include Cisco Identity Services Engine 3.1 and 3.2.
An authenticated, remote attacker can exploit CVE-2023-20087 by downloading arbitrary files from the filesystem of an affected device through the web-based management interface.
More information about CVE-2023-20087 can be found at the following reference: [Cisco Security Advisory](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-dwnld-Srcdnkd2)