First published: Wed Feb 05 2025(Updated: )
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands and elevate privileges on an affected device. Note: To exploit these vulnerabilities, an attacker must have valid ISE administrative credentials. These vulnerabilities can be exploited using any valid administrative account, including read-only administrative accounts. For more information about these vulnerabilities, see the Details section of this advisory.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine (ISE) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ise-multivuls-FTW9AOXF is classified as high due to the potential for arbitrary command execution and privilege escalation.
To fix cisco-sa-ise-multivuls-FTW9AOXF, update the Cisco Identity Services Engine to the latest version released by Cisco.
cisco-sa-ise-multivuls-FTW9AOXF addresses multiple vulnerabilities that enable remote attackers to execute arbitrary commands and elevate privileges.
Any organization using Cisco Identity Services Engine is potentially affected by cisco-sa-ise-multivuls-FTW9AOXF.
An attacker must have valid read-only administrative credentials to exploit cisco-sa-ise-multivuls-FTW9AOXF.