First published: Wed Nov 02 2022(Updated: )
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access system files. This vulnerability is due to improper access control in the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to list, download, and delete certain files that they should not have access to. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx
Credit: Davide Virruso Yoroi for reporting the vulnerability associated with defect CSCwc62419Antonio López Víctor Campos for reporting the vulnerability associated with defect CSCwb75965.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | =3.2<3.2P1=3.1<3.1P6 | 3.2P1 3.1P6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ise-access-contol-EeufSUCx is classified as high due to the potential for unauthorized access to system files.
To fix cisco-sa-ise-access-contol-EeufSUCx, upgrade Cisco Identity Services Engine to the latest version that mitigates the vulnerability.
Cisco Identity Services Engine versions 3.2 up to 3.2P1 and 3.1 up to 3.1P6 are affected by cisco-sa-ise-access-contol-EeufSUCx.
Yes, cisco-sa-ise-access-contol-EeufSUCx can be exploited by authenticated remote attackers.
The vulnerability in cisco-sa-ise-access-contol-EeufSUCx is due to improper access control in the web-based management interface.