First published: Wed Apr 03 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a server-side request forgery (SSRF) attack through an affected device. This vulnerability is due to improper input validation for specific HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected device. To successfully exploit this vulnerability, the attacker would need valid Super Admin credentials.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine (ISE) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20332 has been classified as a critical vulnerability due to its potential for server-side request forgery attacks.
To address CVE-2024-20332, Cisco recommends applying the appropriate security updates or patches for the Cisco Identity Services Engine.
CVE-2024-20332 affects authenticated users of the Cisco Identity Services Engine's web-based management interface.
CVE-2024-20332 allows an authenticated attacker to perform server-side request forgery attacks.
As of now, there are no public reports confirming active exploitation of CVE-2024-20332, but it remains a significant security concern.