First published: Wed Nov 06 2024(Updated: )
A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to bypass the authorization mechanisms for specific file management functions. This vulnerability is due to lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to upload files to a location that should be restricted. To exploit this vulnerability, an attacker would need valid Read-Only Administrator credentials.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine (ISE) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20476 has a high severity rating due to the potential for an authenticated remote attacker to bypass authorization mechanisms.
To remediate CVE-2024-20476, apply the latest security updates and patches provided by Cisco for the Identity Services Engine.
CVE-2024-20476 affects users of Cisco Identity Services Engine who utilize the web-based management interface.
CVE-2024-20476 enables an authenticated remote attacker to bypass authorization for specific file management functions.
Yes, CVE-2024-20476 is considered critical due to its ability to compromise the integrity of file management within the affected software.