First published: Wed Jun 15 2022(Updated: )
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device. This vulnerability exists because administrative privilege levels for sensitive data are not properly enforced. An attacker with read-only privileges for the web-based management interface on an affected device could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information about the system configuration. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disclosure-Os6fSd6N
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | =2.7<2.7.0.305=2.6<2.6.0.156P5>=2.2 and earlier=2.3<=2.4<2.4.0.357P11 | 2.7.0.305 2.6.0.156P5 2.4.0.357P11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability cisco-sa-ise-info-disclosure-Os6fSd6N has been assigned a severity rating, indicating it could potentially allow sensitive information disclosure.
To fix cisco-sa-ise-info-disclosure-Os6fSd6N, install the appropriate security update or patch provided by Cisco for affected ISE versions.
The versions of Cisco ISE affected by cisco-sa-ise-info-disclosure-Os6fSd6N include 2.2 and earlier, 2.3, 2.4, 2.6, and specific patches of 2.7.
The vulnerability cisco-sa-ise-info-disclosure-Os6fSd6N can be exploited by an authenticated, remote attacker.
cisco-sa-ise-info-disclosure-Os6fSd6N may allow unauthorized access to sensitive information stored within the Cisco ISE management interface.