First published: Wed Apr 05 2023(Updated: )
Multiple vulnerabilities in the restricted shell of Cisco Evolved Programmable Network Manager (EPNM), Cisco Identity Services Engine (ISE), and Cisco Prime Infrastructure could allow an authenticated, local attacker to escape the restricted shell and gain root privileges on the
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Evolved Programmable Network Manager | ||
Cisco Identity Services Engine (ISE) | ||
Cisco Prime Infrastructure |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-adeos-MLAyEcvk is considered high due to the potential for local authenticated attackers to gain root privileges.
To fix cisco-sa-adeos-MLAyEcvk, apply the latest patches and updates provided by Cisco for the affected software products.
The products affected by cisco-sa-adeos-MLAyEcvk include Cisco Evolved Programmable Network Manager, Cisco Identity Services Engine, and Cisco Prime Infrastructure.
No, the vulnerabilities outlined in cisco-sa-adeos-MLAyEcvk require local authentication to be exploited.
cisco-sa-adeos-MLAyEcvk involves an authenticated, local attack allowing privilege escalation from the restricted shell to root access.