Lucene search

K
cve[email protected]CVE-2021-34759
HistorySep 02, 2021 - 3:15 a.m.

CVE-2021-34759

2021-09-0203:15:06
CWE-79
web.nvd.nist.gov
29
cve-2021-34759
cisco
identity services engine
ise
software
vulnerability
xss
web-based
management interface
nvd

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

4.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.2%

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need valid administrative credentials.

Affected configurations

NVD
Node
ciscoidentity_services_engineRange<2.2.0
OR
ciscoidentity_services_engineMatch2.2.0-
OR
ciscoidentity_services_engineMatch2.2.0patch1
OR
ciscoidentity_services_engineMatch2.2.0patch10
OR
ciscoidentity_services_engineMatch2.2.0patch12
OR
ciscoidentity_services_engineMatch2.2.0patch13
OR
ciscoidentity_services_engineMatch2.2.0patch14
OR
ciscoidentity_services_engineMatch2.2.0patch15
OR
ciscoidentity_services_engineMatch2.2.0patch16
OR
ciscoidentity_services_engineMatch2.2.0patch17
OR
ciscoidentity_services_engineMatch2.2.0patch2
OR
ciscoidentity_services_engineMatch2.2.0patch3
OR
ciscoidentity_services_engineMatch2.2.0patch4
OR
ciscoidentity_services_engineMatch2.2.0patch5
OR
ciscoidentity_services_engineMatch2.2.0patch6
OR
ciscoidentity_services_engineMatch2.2.0patch7
OR
ciscoidentity_services_engineMatch2.2.0patch8
OR
ciscoidentity_services_engineMatch2.2.0patch9
OR
ciscoidentity_services_engineMatch2.3.0-
OR
ciscoidentity_services_engineMatch2.3.0patch1
OR
ciscoidentity_services_engineMatch2.3.0patch2
OR
ciscoidentity_services_engineMatch2.3.0patch3
OR
ciscoidentity_services_engineMatch2.3.0patch4
OR
ciscoidentity_services_engineMatch2.3.0patch5
OR
ciscoidentity_services_engineMatch2.3.0patch6
OR
ciscoidentity_services_engineMatch2.3.0patch7
OR
ciscoidentity_services_engineMatch2.4.0-
OR
ciscoidentity_services_engineMatch2.4.0patch1
OR
ciscoidentity_services_engineMatch2.4.0patch10
OR
ciscoidentity_services_engineMatch2.4.0patch11
OR
ciscoidentity_services_engineMatch2.4.0patch12
OR
ciscoidentity_services_engineMatch2.4.0patch13
OR
ciscoidentity_services_engineMatch2.4.0patch14
OR
ciscoidentity_services_engineMatch2.4.0patch2
OR
ciscoidentity_services_engineMatch2.4.0patch3
OR
ciscoidentity_services_engineMatch2.4.0patch4
OR
ciscoidentity_services_engineMatch2.4.0patch5
OR
ciscoidentity_services_engineMatch2.4.0patch6
OR
ciscoidentity_services_engineMatch2.4.0patch7
OR
ciscoidentity_services_engineMatch2.4.0patch8
OR
ciscoidentity_services_engineMatch2.4.0patch9
OR
ciscoidentity_services_engineMatch2.6.0-
OR
ciscoidentity_services_engineMatch2.6.0patch1
OR
ciscoidentity_services_engineMatch2.6.0patch2
OR
ciscoidentity_services_engineMatch2.6.0patch3
OR
ciscoidentity_services_engineMatch2.6.0patch5
OR
ciscoidentity_services_engineMatch2.6.0patch6
OR
ciscoidentity_services_engineMatch2.6.0patch7
OR
ciscoidentity_services_engineMatch2.6.0patch8
OR
ciscoidentity_services_engineMatch2.6.0patch9
OR
ciscoidentity_services_engineMatch2.7.0patch1
OR
ciscoidentity_services_engineMatch2.7.0patch2
OR
ciscoidentity_services_engineMatch2.7.0patch3
OR
ciscoidentity_services_engineMatch2.7.0patch4
OR
ciscoidentity_services_engineMatch3.0.0patch1
OR
ciscoidentity_services_engineMatch3.0.0patch2
OR
ciscoidentity_services_engineMatch3.0.0patch3

CNA Affected

[
  {
    "product": "Cisco Identity Services Engine Software ",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

4.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.2%

Related for CVE-2021-34759