First published: Wed Apr 06 2022(Updated: )
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device. This vulnerability is due to improper enforcement of administrative privilege levels for high-value sensitive data. An attacker with read-only Administrator privileges to the web-based management interface on an affected device could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-info-exp-YXAWYP3s
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | =3.1<3.1P01=3.0<3.0P05=2.7<2.7P7>=2.3=2.4<=2.6<2.6P112 (May 2022) | 3.1P01 3.0P05 2.7P7 2.6P112 (May 2022) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-info-exp-YXAWYP3s is classified as high due to the risk of sensitive information disclosure.
To fix cisco-sa-info-exp-YXAWYP3s, upgrade to the latest patched version of Cisco Identity Services Engine as recommended in the advisory.
Cisco Identity Services Engine versions 2.3, 2.4, 2.6, 2.7, 3.0, and 3.1 are affected by cisco-sa-info-exp-YXAWYP3s.
cisco-sa-info-exp-YXAWYP3s involves an authenticated remote attack that can lead to the exposure of sensitive information.
cisco-sa-info-exp-YXAWYP3s is of concern to organizations using Cisco Identity Services Engine, particularly in environments needing secure access management.