First published: Wed Oct 19 2022(Updated: )
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to list, download, and delete files on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains certain character sequences to an affected system. A successful exploit could allow the attacker to list, download, or delete specific files on the device that their configured administrative level should not have access to. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM
Credit: Davide Virruso Yoroi
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | =3.2<3.2P1=3.1<3.1P5 | 3.2P1 3.1P5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ise-path-trav-Dz5dpzyM is classified as high due to its potential for unauthorized file access and manipulation.
To fix cisco-sa-ise-path-trav-Dz5dpzyM, update your Cisco Identity Services Engine to a patched version as recommended by the vendor.
cisco-sa-ise-path-trav-Dz5dpzyM is caused by insufficient validation of user-supplied input in the web-based management interface of Cisco Identity Services Engine.
cisco-sa-ise-path-trav-Dz5dpzyM affects Cisco Identity Services Engine versions 3.2 and below, specifically versions up to 3.2P1 and 3.1 up to 3.1P5.
The potential impacts of cisco-sa-ise-path-trav-Dz5dpzyM include unauthorized file listing, downloading, and deletion by an authenticated remote attacker.