CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
29.7%
A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface.
This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks.
Cisco has not yet released software updates that address this vulnerability.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | identity_services_engine | * | cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:* |
cisco | identity_services_engine | 2.6.0 | cpe:2.3:a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:* |
cisco | identity_services_engine | 2.6.0 | cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:* |
cisco | identity_services_engine | 2.6.0 | cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch10:*:*:*:*:*:* |
cisco | identity_services_engine | 2.6.0 | cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch11:*:*:*:*:*:* |
cisco | identity_services_engine | 2.6.0 | cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch12:*:*:*:*:*:* |
cisco | identity_services_engine | 2.6.0 | cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:* |
cisco | identity_services_engine | 2.6.0 | cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:* |
cisco | identity_services_engine | 2.6.0 | cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:* |
cisco | identity_services_engine | 2.6.0 | cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:* |
[
{
"vendor": "Cisco",
"product": "Cisco Identity Services Engine Software",
"versions": [
{
"version": "2.6.0",
"status": "affected"
},
{
"version": "2.6.0 p1",
"status": "affected"
},
{
"version": "2.6.0 p2",
"status": "affected"
},
{
"version": "2.6.0 p3",
"status": "affected"
},
{
"version": "2.6.0 p5",
"status": "affected"
},
{
"version": "2.6.0 p6",
"status": "affected"
},
{
"version": "2.6.0 p7",
"status": "affected"
},
{
"version": "2.6.0 p8",
"status": "affected"
},
{
"version": "2.6.0 p9",
"status": "affected"
},
{
"version": "2.6.0 p10",
"status": "affected"
},
{
"version": "2.6.0 p11",
"status": "affected"
},
{
"version": "2.6.0 p12",
"status": "affected"
},
{
"version": "2.7.0",
"status": "affected"
},
{
"version": "2.7.0 p1",
"status": "affected"
},
{
"version": "2.7.0 p2",
"status": "affected"
},
{
"version": "2.7.0 p3",
"status": "affected"
},
{
"version": "2.7.0 p4",
"status": "affected"
},
{
"version": "2.7.0 p5",
"status": "affected"
},
{
"version": "2.7.0 p6",
"status": "affected"
},
{
"version": "2.7.0 p7",
"status": "affected"
},
{
"version": "3.0.0",
"status": "affected"
},
{
"version": "3.0.0 p1",
"status": "affected"
},
{
"version": "3.0.0 p2",
"status": "affected"
},
{
"version": "3.0.0 p3",
"status": "affected"
},
{
"version": "3.0.0 p4",
"status": "affected"
},
{
"version": "3.0.0 p5",
"status": "affected"
},
{
"version": "3.0.0 p6",
"status": "affected"
},
{
"version": "3.1.0",
"status": "affected"
},
{
"version": "3.1.0 p1",
"status": "affected"
},
{
"version": "3.1.0 p3",
"status": "affected"
},
{
"version": "3.1.0 p4",
"status": "affected"
},
{
"version": "3.1.0 p5",
"status": "affected"
},
{
"version": "3.2.0",
"status": "affected"
}
]
}
]
More