First published: Thu Sep 07 2023(Updated: )
A vulnerability in the ERS API of Cisco ISE could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device. To exploit this vulnerability, an attacker must have valid Administrator-level privileges on the affected device. This vulnerability is due to improper privilege management in the ERS API. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to elevate their privileges beyond the sphere of their intended access level, which would allow them to obtain sensitive information from the underlying operating system. Note: The ERS is not enabled by default. To verify the status of the ERS API in the Admin GUI, choose Administration > Settings > API Settings > API Service Settings.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | <=2.7 | |
Cisco Identity Services Engine | =3.0.0 | |
Cisco Identity Services Engine | =3.0.0-patch1 | |
Cisco Identity Services Engine | =3.0.0-patch2 | |
Cisco Identity Services Engine | =3.0.0-patch3 | |
Cisco Identity Services Engine | =3.0.0-patch4 | |
Cisco Identity Services Engine | =3.0.0-patch5 | |
Cisco Identity Services Engine | =3.0.0-patch6 | |
Cisco Identity Services Engine | =3.0.0-patch7 | |
Cisco Identity Services Engine | =3.1 | |
Cisco Identity Services Engine | =3.1-patch1 | |
Cisco Identity Services Engine | =3.1-patch3 | |
Cisco Identity Services Engine | =3.1-patch4 | |
Cisco Identity Services Engine | =3.1-patch5 | |
Cisco Identity Services Engine | =3.1-patch6 | |
Cisco Identity Services Engine | =3.1-patch7 | |
Cisco Identity Services Engine | =3.2 | |
Cisco Identity Services Engine | =3.2-patch1 | |
Cisco Identity Services Engine | =3.2-patch2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20194 is a vulnerability in the ERS API of Cisco ISE that allows an authenticated remote attacker to read arbitrary files.
The severity of CVE-2023-20194 is medium with a score of 4.9.
CVE-2023-20194 affects Cisco Identity Services Engine versions 2.7 to 3.2.
To exploit CVE-2023-20194, an attacker must have valid Administrator-level privileges on the affected device.
Yes, Cisco has released a fix for CVE-2023-20194. Please refer to the Cisco Security Advisory for more information.