First published: Wed Oct 06 2021(Updated: )
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information. This vulnerability is due to improper enforcement of administrator privilege levels for low-value sensitive data. An attacker with read-only administrator access to the web-based management interface could exploit this vulnerability by browsing to the page that contains the sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disc-pNXtLhdp
Credit: security researcher Nishant Raman.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | >=2.2=2.4<=2.6<2.6 Patch 11 (future release) | 2.6 Patch 11 (future release) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ise-info-disc-pNXtLhdp is categorized as medium.
To fix cisco-sa-ise-info-disc-pNXtLhdp, upgrade to Cisco Identity Services Engine version 2.6 Patch 11 or later.
Cisco Identity Services Engine versions 2.2, 2.4, and 2.6 prior to Patch 11 are affected by cisco-sa-ise-info-disc-pNXtLhdp.
cisco-sa-ise-info-disc-pNXtLhdp may expose low-value sensitive data to authenticated attackers.
Yes, cisco-sa-ise-info-disc-pNXtLhdp requires an authenticated remote attacker to exploit the vulnerability.