First published: Wed Jul 17 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit this vulnerability, an attacker would need at least valid Policy Admin credentials on the affected device. This vulnerability is due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit this vulnerability by uploading arbitrary files to an affected device. A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine (ISE) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20296 is classified as a medium severity vulnerability.
To fix CVE-2024-20296, it's recommended to apply the security patches provided by Cisco for the Identity Services Engine.
CVE-2024-20296 affects Cisco Identity Services Engine.
An attacker exploiting CVE-2024-20296 can upload arbitrary files to the affected Cisco Identity Services Engine device.
Yes, exploitation of CVE-2024-20296 requires valid Policy Admin credentials.