First published: Thu May 18 2023(Updated: )
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to delete or read arbitrary files on the underlying operating system. To exploit these vulnerabilities, an attacker must have valid credentials on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | =3.1 | |
Cisco Identity Services Engine | =3.1-patch1 | |
Cisco Identity Services Engine | =3.1-patch3 | |
Cisco Identity Services Engine | =3.1-patch4 | |
Cisco Identity Services Engine | =3.1-patch5 | |
Cisco Identity Services Engine | =3.2 | |
Cisco Identity Services Engine | =3.2-patch1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20172 is a vulnerability in Cisco Identity Services Engine (ISE) that could allow an authenticated attacker to delete or read arbitrary files on the underlying operating system.
CVE-2023-20172 has a severity rating of 4.9 (medium).
Cisco Identity Services Engine versions 3.1, 3.1-patch1, 3.1-patch3, 3.1-patch4, 3.1-patch5, 3.2, and 3.2-patch1 are affected by CVE-2023-20172.
To exploit CVE-2023-20172, an attacker must have valid credentials on an affected device.
Yes, Cisco has released patches to address the vulnerabilities. Please refer to the Cisco Security Advisory linked above for more information.