First published: Wed Aug 07 2024(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. For more information about these vulnerabilities, see
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine (ISE) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ise-xss-V2bm9JCY is classified as high because it allows authenticated remote attackers to perform cross-site scripting (XSS) attacks.
To fix cisco-sa-ise-xss-V2bm9JCY, ensure that you apply the latest security patch provided by Cisco for the Identity Services Engine.
Organizations using Cisco Identity Services Engine (ISE) with the vulnerable web-based management interface are affected by cisco-sa-ise-xss-V2bm9JCY.
The potential impacts of cisco-sa-ise-xss-V2bm9JCY include unauthorized access to sensitive information and manipulation of web sessions through XSS.
Yes, user authentication is required to exploit the vulnerabilities noted in cisco-sa-ise-xss-V2bm9JCY.