Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2023-2805
Vulnerability from csaf_certbund
Published
2023-11-01 23:00
Modified
2023-11-01 23:00
Summary
Cisco Identity Services Engine (ISE): Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Cisco Identity Services Engine (ISE) bietet eine attributbasierte Zugangs-Kontroll-Lösung.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Cisco Identity Services Engine (ISE) ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, Dateien zu manipulieren oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- CISCO Appliance
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Cisco Identity Services Engine (ISE) bietet eine attributbasierte Zugangs-Kontroll-L\u00f6sung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Cisco Identity Services Engine (ISE) ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Dateien zu manipulieren oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- CISCO Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2805 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2805.json" }, { "category": "self", "summary": "WID-SEC-2023-2805 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2805" }, { "category": "external", "summary": "Cisco Security Advisory vom 2023-11-01", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-QeXegrCw" }, { "category": "external", "summary": "Cisco Security Advisory vom 2023-11-01", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs" } ], "source_lang": "en-US", "title": "Cisco Identity Services Engine (ISE): Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-11-01T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:49:51.646+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2805", "initial_release_date": "2023-11-01T23:00:00.000+00:00", "revision_history": [ { "date": "2023-11-01T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Cisco Identity Services Engine (ISE) \u003c 2.7P10", "product": { "name": "Cisco Identity Services Engine (ISE) \u003c 2.7P10", "product_id": "T030878", "product_identification_helper": { "cpe": "cpe:/a:cisco:identity_services_engine_software:2.7p10" } } }, { "category": "product_name", "name": "Cisco Identity Services Engine (ISE) \u003c 3.0P7", "product": { "name": "Cisco Identity Services Engine (ISE) \u003c 3.0P7", "product_id": "T030879", "product_identification_helper": { "cpe": "cpe:/a:cisco:identity_services_engine_software:3.0p7" } } }, { "category": "product_name", "name": "Cisco Identity Services Engine (ISE) \u003c 3.1P6", "product": { "name": "Cisco Identity Services Engine (ISE) \u003c 3.1P6", "product_id": "T030880", "product_identification_helper": { "cpe": "cpe:/a:cisco:identity_services_engine_software:3.1p6" } } }, { "category": "product_name", "name": "Cisco Identity Services Engine (ISE) \u003c 3.2P2", "product": { "name": "Cisco Identity Services Engine (ISE) \u003c 3.2P2", "product_id": "T030881", "product_identification_helper": { "cpe": "cpe:/a:cisco:identity_services_engine_software:3.2p2" } } } ], "category": "product_name", "name": "Identity Services Engine (ISE)" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20196", "notes": [ { "category": "description", "text": "In Cisco Identity Services Engine (ISE) existieren mehrere Schwachstellen. Diese sind auf eine unzureichende \u00dcberpr\u00fcfung von Eingaben zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren." } ], "release_date": "2023-11-01T23:00:00Z", "title": "CVE-2023-20196" }, { "cve": "CVE-2023-20195", "notes": [ { "category": "description", "text": "In Cisco Identity Services Engine (ISE) existieren mehrere Schwachstellen. Diese sind auf eine unzureichende \u00dcberpr\u00fcfung von Eingaben zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren." } ], "release_date": "2023-11-01T23:00:00Z", "title": "CVE-2023-20195" }, { "cve": "CVE-2023-20213", "notes": [ { "category": "description", "text": "In Cisco Identity Services Engine (ISE) existiert eine Schwachstelle. Diese ist auf einen Fehler bei der Verarbeitung von CDP-Traffic zur\u00fcckzuf\u00fchren. Ein anonymer Angreifer im angrenzenden Netzbereich kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2023-11-01T23:00:00Z", "title": "CVE-2023-20213" }, { "cve": "CVE-2023-20175", "notes": [ { "category": "description", "text": "In Cisco Identity Services Engine (ISE) existieren mehrere Schwachstellen. Diese sind auf eine unzureichende \u00dcberpr\u00fcfung von Eingaben zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren." } ], "release_date": "2023-11-01T23:00:00Z", "title": "CVE-2023-20175" }, { "cve": "CVE-2023-20170", "notes": [ { "category": "description", "text": "In Cisco Identity Services Engine (ISE) existieren mehrere Schwachstellen. Diese sind auf eine unzureichende \u00dcberpr\u00fcfung von Eingaben zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren." } ], "release_date": "2023-11-01T23:00:00Z", "title": "CVE-2023-20170" } ] }
cve-2023-20170
Vulnerability from cvelistv5
Published
2023-11-01 17:12
Modified
2024-10-23 19:06
Severity ?
EPSS score ?
Summary
A vulnerability in a specific Cisco ISE CLI command could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, an attacker must have valid Administrator-level privileges on the affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Identity Services Engine Software |
Version: N/A |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ise-injection-QeXegrCw", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-QeXegrCw" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20170", "options": [ { "Exploitation": "None" }, { "Automatable": "No" }, { "Technical Impact": "Total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T19:06:13.283737Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T19:06:32.399Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Identity Services Engine Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in a specific Cisco ISE CLI command could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, an attacker must have valid Administrator-level privileges on the affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:49.359Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ise-injection-QeXegrCw", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-QeXegrCw" } ], "source": { "advisory": "cisco-sa-ise-injection-QeXegrCw", "defects": [ "CSCwd41220" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20170", "datePublished": "2023-11-01T17:12:41.451Z", "dateReserved": "2022-10-27T18:47:50.363Z", "dateUpdated": "2024-10-23T19:06:32.399Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20195
Vulnerability from cvelistv5
Published
2023-11-01 16:59
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Two vulnerabilities in Cisco ISE could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. These vulnerabilities are due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit these vulnerabilities by uploading a crafted file to an affected device. A successful exploit could allow the attacker to store malicious files in specific directories on the device. The attacker could later use those files to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Identity Services Engine Software |
Version: 2.6.0 Version: 2.6.0 p1 Version: 2.6.0 p2 Version: 2.6.0 p3 Version: 2.6.0 p5 Version: 2.6.0 p6 Version: 2.6.0 p7 Version: 2.6.0 p8 Version: 2.6.0 p9 Version: 2.6.0 p10 Version: 2.6.0 p11 Version: 2.6.0 p12 Version: 2.7.0 Version: 2.7.0 p1 Version: 2.7.0 p2 Version: 2.7.0 p3 Version: 2.7.0 p4 Version: 2.7.0 p5 Version: 2.7.0 p6 Version: 2.7.0 p7 Version: 2.7.0 p9 Version: 3.0.0 Version: 3.0.0 p1 Version: 3.0.0 p2 Version: 3.0.0 p3 Version: 3.0.0 p4 Version: 3.0.0 p5 Version: 3.0.0 p6 Version: 3.0.0 p7 Version: 3.1.0 Version: 3.1.0 p1 Version: 3.1.0 p3 Version: 3.1.0 p4 Version: 3.1.0 p5 Version: 3.1.0 p6 Version: 3.1.0 p7 Version: 3.2.0 Version: 3.2.0 p1 Version: 3.2.0 p2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.963Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ise-file-upload-FceLP4xs", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Identity Services Engine Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.6.0" }, { "status": "affected", "version": "2.6.0 p1" }, { "status": "affected", "version": "2.6.0 p2" }, { "status": "affected", "version": "2.6.0 p3" }, { "status": "affected", "version": "2.6.0 p5" }, { "status": "affected", "version": "2.6.0 p6" }, { "status": "affected", "version": "2.6.0 p7" }, { "status": "affected", "version": "2.6.0 p8" }, { "status": "affected", "version": "2.6.0 p9" }, { "status": "affected", "version": "2.6.0 p10" }, { "status": "affected", "version": "2.6.0 p11" }, { "status": "affected", "version": "2.6.0 p12" }, { "status": "affected", "version": "2.7.0" }, { "status": "affected", "version": "2.7.0 p1" }, { "status": "affected", "version": "2.7.0 p2" }, { "status": "affected", "version": "2.7.0 p3" }, { "status": "affected", "version": "2.7.0 p4" }, { "status": "affected", "version": "2.7.0 p5" }, { "status": "affected", "version": "2.7.0 p6" }, { "status": "affected", "version": "2.7.0 p7" }, { "status": "affected", "version": "2.7.0 p9" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.0 p1" }, { "status": "affected", "version": "3.0.0 p2" }, { "status": "affected", "version": "3.0.0 p3" }, { "status": "affected", "version": "3.0.0 p4" }, { "status": "affected", "version": "3.0.0 p5" }, { "status": "affected", "version": "3.0.0 p6" }, { "status": "affected", "version": "3.0.0 p7" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.0 p1" }, { "status": "affected", "version": "3.1.0 p3" }, { "status": "affected", "version": "3.1.0 p4" }, { "status": "affected", "version": "3.1.0 p5" }, { "status": "affected", "version": "3.1.0 p6" }, { "status": "affected", "version": "3.1.0 p7" }, { "status": "affected", "version": "3.2.0" }, { "status": "affected", "version": "3.2.0 p1" }, { "status": "affected", "version": "3.2.0 p2" } ] } ], "descriptions": [ { "lang": "en", "value": "Two vulnerabilities in Cisco ISE could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. These vulnerabilities are due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit these vulnerabilities by uploading a crafted file to an affected device. A successful exploit could allow the attacker to store malicious files in specific directories on the device. The attacker could later use those files to conduct additional attacks, including executing arbitrary code on the affected device with root privileges." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:54.662Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ise-file-upload-FceLP4xs", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs" } ], "source": { "advisory": "cisco-sa-ise-file-upload-FceLP4xs", "defects": [ "CSCwd93717" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20195", "datePublished": "2023-11-01T16:59:40.981Z", "dateReserved": "2022-10-27T18:47:50.365Z", "dateUpdated": "2024-08-02T09:05:35.963Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20196
Vulnerability from cvelistv5
Published
2023-11-01 17:01
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Two vulnerabilities in Cisco ISE could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. These vulnerabilities are due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit these vulnerabilities by uploading a crafted file to an affected device. A successful exploit could allow the attacker to store malicious files in specific directories on the device. The attacker could later use those files to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Identity Services Engine Software |
Version: 2.6.0 Version: 2.6.0 p1 Version: 2.6.0 p2 Version: 2.6.0 p3 Version: 2.6.0 p5 Version: 2.6.0 p6 Version: 2.6.0 p7 Version: 2.6.0 p8 Version: 2.6.0 p9 Version: 2.6.0 p10 Version: 2.6.0 p11 Version: 2.6.0 p12 Version: 2.7.0 Version: 2.7.0 p1 Version: 2.7.0 p2 Version: 2.7.0 p3 Version: 2.7.0 p4 Version: 2.7.0 p5 Version: 2.7.0 p6 Version: 2.7.0 p7 Version: 2.7.0 p9 Version: 3.0.0 Version: 3.0.0 p1 Version: 3.0.0 p2 Version: 3.0.0 p3 Version: 3.0.0 p4 Version: 3.0.0 p5 Version: 3.0.0 p6 Version: 3.0.0 p7 Version: 3.1.0 Version: 3.1.0 p1 Version: 3.1.0 p3 Version: 3.1.0 p4 Version: 3.1.0 p5 Version: 3.1.0 p6 Version: 3.1.0 p7 Version: 3.2.0 Version: 3.2.0 p1 Version: 3.2.0 p2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.920Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ise-file-upload-FceLP4xs", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Identity Services Engine Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.6.0" }, { "status": "affected", "version": "2.6.0 p1" }, { "status": "affected", "version": "2.6.0 p2" }, { "status": "affected", "version": "2.6.0 p3" }, { "status": "affected", "version": "2.6.0 p5" }, { "status": "affected", "version": "2.6.0 p6" }, { "status": "affected", "version": "2.6.0 p7" }, { "status": "affected", "version": "2.6.0 p8" }, { "status": "affected", "version": "2.6.0 p9" }, { "status": "affected", "version": "2.6.0 p10" }, { "status": "affected", "version": "2.6.0 p11" }, { "status": "affected", "version": "2.6.0 p12" }, { "status": "affected", "version": "2.7.0" }, { "status": "affected", "version": "2.7.0 p1" }, { "status": "affected", "version": "2.7.0 p2" }, { "status": "affected", "version": "2.7.0 p3" }, { "status": "affected", "version": "2.7.0 p4" }, { "status": "affected", "version": "2.7.0 p5" }, { "status": "affected", "version": "2.7.0 p6" }, { "status": "affected", "version": "2.7.0 p7" }, { "status": "affected", "version": "2.7.0 p9" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.0 p1" }, { "status": "affected", "version": "3.0.0 p2" }, { "status": "affected", "version": "3.0.0 p3" }, { "status": "affected", "version": "3.0.0 p4" }, { "status": "affected", "version": "3.0.0 p5" }, { "status": "affected", "version": "3.0.0 p6" }, { "status": "affected", "version": "3.0.0 p7" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.0 p1" }, { "status": "affected", "version": "3.1.0 p3" }, { "status": "affected", "version": "3.1.0 p4" }, { "status": "affected", "version": "3.1.0 p5" }, { "status": "affected", "version": "3.1.0 p6" }, { "status": "affected", "version": "3.1.0 p7" }, { "status": "affected", "version": "3.2.0" }, { "status": "affected", "version": "3.2.0 p1" }, { "status": "affected", "version": "3.2.0 p2" } ] } ], "descriptions": [ { "lang": "en", "value": "Two vulnerabilities in Cisco ISE could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. These vulnerabilities are due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit these vulnerabilities by uploading a crafted file to an affected device. A successful exploit could allow the attacker to store malicious files in specific directories on the device. The attacker could later use those files to conduct additional attacks, including executing arbitrary code on the affected device with root privileges." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:54.983Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ise-file-upload-FceLP4xs", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs" } ], "source": { "advisory": "cisco-sa-ise-file-upload-FceLP4xs", "defects": [ "CSCwd93720" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20196", "datePublished": "2023-11-01T17:01:34.690Z", "dateReserved": "2022-10-27T18:47:50.365Z", "dateUpdated": "2024-08-02T09:05:36.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20213
Vulnerability from cvelistv5
Published
2023-11-01 16:58
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A vulnerability in the CDP processing feature of Cisco ISE could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of the CDP process on an affected device. This vulnerability is due to insufficient bounds checking when an affected device processes CDP traffic. An attacker could exploit this vulnerability by sending crafted CDP traffic to the device. A successful exploit could cause the CDP process to crash, impacting neighbor discovery and the ability of Cisco ISE to determine the reachability of remote devices. After a crash, the CDP process must be manually restarted using the cdp enable command in interface configuration mode.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Identity Services Engine Software |
Version: 2.6.0 Version: 2.6.0 p1 Version: 2.6.0 p2 Version: 2.6.0 p3 Version: 2.6.0 p5 Version: 2.6.0 p6 Version: 2.6.0 p7 Version: 2.6.0 p8 Version: 2.6.0 p9 Version: 2.6.0 p10 Version: 2.6.0 p11 Version: 2.6.0 p12 Version: 2.7.0 Version: 2.7.0 p1 Version: 2.7.0 p2 Version: 2.7.0 p3 Version: 2.7.0 p4 Version: 2.7.0 p5 Version: 2.7.0 p6 Version: 2.7.0 p7 Version: 2.7.0 p9 Version: 3.0.0 Version: 3.0.0 p1 Version: 3.0.0 p2 Version: 3.0.0 p3 Version: 3.0.0 p4 Version: 3.0.0 p5 Version: 3.0.0 p6 Version: 3.1.0 Version: 3.1.0 p1 Version: 3.1.0 p3 Version: 3.1.0 p4 Version: 3.1.0 p5 Version: 3.1.0 p7 Version: 3.2.0 Version: 3.2.0 p1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ise-file-upload-FceLP4xs", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Identity Services Engine Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.6.0" }, { "status": "affected", "version": "2.6.0 p1" }, { "status": "affected", "version": "2.6.0 p2" }, { "status": "affected", "version": "2.6.0 p3" }, { "status": "affected", "version": "2.6.0 p5" }, { "status": "affected", "version": "2.6.0 p6" }, { "status": "affected", "version": "2.6.0 p7" }, { "status": "affected", "version": "2.6.0 p8" }, { "status": "affected", "version": "2.6.0 p9" }, { "status": "affected", "version": "2.6.0 p10" }, { "status": "affected", "version": "2.6.0 p11" }, { "status": "affected", "version": "2.6.0 p12" }, { "status": "affected", "version": "2.7.0" }, { "status": "affected", "version": "2.7.0 p1" }, { "status": "affected", "version": "2.7.0 p2" }, { "status": "affected", "version": "2.7.0 p3" }, { "status": "affected", "version": "2.7.0 p4" }, { "status": "affected", "version": "2.7.0 p5" }, { "status": "affected", "version": "2.7.0 p6" }, { "status": "affected", "version": "2.7.0 p7" }, { "status": "affected", "version": "2.7.0 p9" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.0 p1" }, { "status": "affected", "version": "3.0.0 p2" }, { "status": "affected", "version": "3.0.0 p3" }, { "status": "affected", "version": "3.0.0 p4" }, { "status": "affected", "version": "3.0.0 p5" }, { "status": "affected", "version": "3.0.0 p6" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.0 p1" }, { "status": "affected", "version": "3.1.0 p3" }, { "status": "affected", "version": "3.1.0 p4" }, { "status": "affected", "version": "3.1.0 p5" }, { "status": "affected", "version": "3.1.0 p7" }, { "status": "affected", "version": "3.2.0" }, { "status": "affected", "version": "3.2.0 p1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CDP processing feature of Cisco ISE could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of the CDP process on an affected device. This vulnerability is due to insufficient bounds checking when an affected device processes CDP traffic. An attacker could exploit this vulnerability by sending crafted CDP traffic to the device. A successful exploit could cause the CDP process to crash, impacting neighbor discovery and the ability of Cisco ISE to determine the reachability of remote devices. After a crash, the CDP process must be manually restarted using the cdp enable command in interface configuration mode." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:58:19.551Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ise-file-upload-FceLP4xs", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs" } ], "source": { "advisory": "cisco-sa-ise-file-upload-FceLP4xs", "defects": [ "CSCwc71225" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20213", "datePublished": "2023-11-01T16:58:11.623Z", "dateReserved": "2022-10-27T18:47:50.367Z", "dateUpdated": "2024-08-02T09:05:35.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20175
Vulnerability from cvelistv5
Published
2023-11-01 17:13
Modified
2024-10-23 19:05
Severity ?
EPSS score ?
Summary
A vulnerability in a specific Cisco ISE CLI command could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, an attacker must have valid Read-only-level privileges or higher on the affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Identity Services Engine Software |
Version: 2.6.0 Version: 2.6.0 p1 Version: 2.6.0 p2 Version: 2.6.0 p3 Version: 2.6.0 p5 Version: 2.6.0 p6 Version: 2.6.0 p7 Version: 2.6.0 p8 Version: 2.6.0 p9 Version: 2.6.0 p10 Version: 2.6.0 p11 Version: 2.6.0 p12 Version: 2.7.0 Version: 2.7.0 p1 Version: 2.7.0 p2 Version: 2.7.0 p3 Version: 2.7.0 p4 Version: 2.7.0 p5 Version: 2.7.0 p6 Version: 2.7.0 p7 Version: 2.7.0 p9 Version: 3.0.0 Version: 3.0.0 p1 Version: 3.0.0 p2 Version: 3.0.0 p3 Version: 3.0.0 p4 Version: 3.0.0 p5 Version: 3.0.0 p6 Version: 3.0.0 p7 Version: 3.1.0 Version: 3.1.0 p1 Version: 3.1.0 p3 Version: 3.1.0 p4 Version: 3.1.0 p5 Version: 3.2.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ise-injection-QeXegrCw", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-QeXegrCw" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20175", "options": [ { "Exploitation": "None" }, { "Automatable": "No" }, { "Technical Impact": "Total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T19:05:32.577934Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T19:05:47.682Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Identity Services Engine Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.6.0" }, { "status": "affected", "version": "2.6.0 p1" }, { "status": "affected", "version": "2.6.0 p2" }, { "status": "affected", "version": "2.6.0 p3" }, { "status": "affected", "version": "2.6.0 p5" }, { "status": "affected", "version": "2.6.0 p6" }, { "status": "affected", "version": "2.6.0 p7" }, { "status": "affected", "version": "2.6.0 p8" }, { "status": "affected", "version": "2.6.0 p9" }, { "status": "affected", "version": "2.6.0 p10" }, { "status": "affected", "version": "2.6.0 p11" }, { "status": "affected", "version": "2.6.0 p12" }, { "status": "affected", "version": "2.7.0" }, { "status": "affected", "version": "2.7.0 p1" }, { "status": "affected", "version": "2.7.0 p2" }, { "status": "affected", "version": "2.7.0 p3" }, { "status": "affected", "version": "2.7.0 p4" }, { "status": "affected", "version": "2.7.0 p5" }, { "status": "affected", "version": "2.7.0 p6" }, { "status": "affected", "version": "2.7.0 p7" }, { "status": "affected", "version": "2.7.0 p9" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.0.0 p1" }, { "status": "affected", "version": "3.0.0 p2" }, { "status": "affected", "version": "3.0.0 p3" }, { "status": "affected", "version": "3.0.0 p4" }, { "status": "affected", "version": "3.0.0 p5" }, { "status": "affected", "version": "3.0.0 p6" }, { "status": "affected", "version": "3.0.0 p7" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.0 p1" }, { "status": "affected", "version": "3.1.0 p3" }, { "status": "affected", "version": "3.1.0 p4" }, { "status": "affected", "version": "3.1.0 p5" }, { "status": "affected", "version": "3.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in a specific Cisco ISE CLI command could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, an attacker must have valid Read-only-level privileges or higher on the affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:49.673Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ise-injection-QeXegrCw", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-QeXegrCw" } ], "source": { "advisory": "cisco-sa-ise-injection-QeXegrCw", "defects": [ "CSCwd07353" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20175", "datePublished": "2023-11-01T17:13:18.726Z", "dateReserved": "2022-10-27T18:47:50.363Z", "dateUpdated": "2024-10-23T19:05:47.682Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.