First published: Thu May 18 2023(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to read arbitrary files or conduct a server-side request forgery (SSRF) attack through an affected device. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | <3.0.0 | |
Cisco Identity Services Engine | =3.0.0 | |
Cisco Identity Services Engine | =3.0.0-patch1 | |
Cisco Identity Services Engine | =3.0.0-patch2 | |
Cisco Identity Services Engine | =3.0.0-patch3 | |
Cisco Identity Services Engine | =3.0.0-patch4 | |
Cisco Identity Services Engine | =3.0.0-patch5 | |
Cisco Identity Services Engine | =3.0.0-patch6 | |
Cisco Identity Services Engine | =3.0.0-patch7 | |
Cisco Identity Services Engine | =3.1 | |
Cisco Identity Services Engine | =3.1-patch1 | |
Cisco Identity Services Engine | =3.1-patch3 | |
Cisco Identity Services Engine | =3.1-patch4 | |
Cisco Identity Services Engine | =3.1-patch5 | |
Cisco Identity Services Engine | =3.1-patch6 | |
Cisco Identity Services Engine | =3.2 | |
Cisco Identity Services Engine | =3.2-patch1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-20173.
The severity of CVE-2023-20173 is medium.
The affected software is Cisco Identity Services Engine version 3.0.0 up to exclusive 3.0.0-patch7, version 3.1 up to exclusive 3.1-patch6, and version 3.2 up to exclusive 3.2-patch1.
An attacker can exploit CVE-2023-20173 by reading arbitrary files or conducting a server-side request forgery (SSRF) attack through an affected device.
You can find more information about CVE-2023-20173 in the Cisco Security Advisory at the following link: [Cisco Security Advisory](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-inj-696OZTCm)