First published: Wed Sep 04 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability exists because the web-based management interface of the affected device does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-ise-xss
Credit: Krzyszt Przybylski of STM Solutions
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | >=2.3<=2.4<2.4 P10 | 2.4 P10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190904-ise-xss is classified as high due to its potential impact on user data security.
To fix cisco-sa-20190904-ise-xss, users should upgrade to the latest recommended version of Cisco Identity Services Engine Software.
Cisco Identity Services Engine Software versions from 2.3 up to, but not including, 2.4 P10 are affected by cisco-sa-20190904-ise-xss.
cisco-sa-20190904-ise-xss enables an unauthenticated remote cross-site scripting (XSS) attack.
No, user authentication is not required for exploiting cisco-sa-20190904-ise-xss.