First published: Wed Oct 20 2021(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss1-rgxYry2V
Credit: Rithin Uppal Visa for reporting the vulnerability associated with CVEAlexander Polce Leary AIG for reporting the vulnerability associated with CVE
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | >=All versions earlier than 2.4=2.4<=2.6<2.6 P10 | 2.6 P10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ise-xss1-rgxYry2V is classified as high due to the potential for cross-site scripting attacks.
To fix cisco-sa-ise-xss1-rgxYry2V, upgrade Cisco Identity Services Engine to version 2.6 P10 or a later version.
cisco-sa-ise-xss1-rgxYry2V affects all versions of Cisco Identity Services Engine prior to 2.4 and 2.6 versions prior to P10.
cisco-sa-ise-xss1-rgxYry2V enables cross-site scripting (XSS) attacks against users of the Cisco Identity Services Engine management interface.
You should monitor for unusual activity or potential exploitation attempts targeting the web-based management interface of Cisco Identity Services Engine.