First published: Wed Feb 05 2025(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid administrative credentials.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-42tgsdMG
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine (ISE) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ise-xss-42tgsdMG is classified as high due to the potential for cross-site scripting attacks.
To fix cisco-sa-ise-xss-42tgsdMG, ensure that your Cisco Identity Services Engine software is updated to the latest version provided by Cisco.
The vulnerability cisco-sa-ise-xss-42tgsdMG affects users of the Cisco Identity Services Engine who utilize the web-based management interface.
cisco-sa-ise-xss-42tgsdMG describes multiple cross-site scripting (XSS) vulnerabilities.
Yes, cisco-sa-ise-xss-42tgsdMG can be exploited by an authenticated remote attacker.