Lucene search

K
vulnrichmentCiscoVULNRICHMENT:CVE-2024-20296
HistoryJul 17, 2024 - 4:28 p.m.

CVE-2024-20296

2024-07-1716:28:22
cisco
github.com
6
cisco identity services engine
unauthorized file uploads
remote code execution
web-based management interface
cve-2024-20296
privilege escalation

CVSS3

4.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

AI Score

7.9

Confidence

High

EPSS

0

Percentile

9.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit this vulnerability, an attacker would need at least valid Policy Admin credentials on the affected device.

This vulnerability is due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit this vulnerability by uploading arbitrary files to an affected device. A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:cisco:identity_services_engine_software:2.7.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p1:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p2:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p4:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p5:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p6:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p7:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p8:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p9:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:2.7.0_p10:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.0.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p1:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p2:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p4:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p5:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p6:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p7:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.0.0_p8:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.1.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p1:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p2:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p4:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p5:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p6:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p7:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p8:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.1.0_p9:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.2.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.2.0_p1:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.2.0_p2:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.2.0_p3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.2.0_p4:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.2.0_p5:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.2.0_p6:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:identity_services_engine_software:3.3.0:*:*:*:*:*:*:*"
    ],
    "vendor": "cisco",
    "product": "identity_services_engine_software",
    "versions": [
      {
        "status": "affected",
        "version": "2.7.0"
      },
      {
        "status": "affected",
        "version": "2.7.0_p1"
      },
      {
        "status": "affected",
        "version": "2.7.0_p2"
      },
      {
        "status": "affected",
        "version": "2.7.0_p3"
      },
      {
        "status": "affected",
        "version": "2.7.0_p4"
      },
      {
        "status": "affected",
        "version": "2.7.0_p5"
      },
      {
        "status": "affected",
        "version": "2.7.0_p6"
      },
      {
        "status": "affected",
        "version": "2.7.0_p7"
      },
      {
        "status": "affected",
        "version": "2.7.0_p8"
      },
      {
        "status": "affected",
        "version": "2.7.0_p9"
      },
      {
        "status": "affected",
        "version": "2.7.0_p10"
      },
      {
        "status": "affected",
        "version": "3.0.0"
      },
      {
        "status": "affected",
        "version": "3.0.0_p1"
      },
      {
        "status": "affected",
        "version": "3.0.0_p2"
      },
      {
        "status": "affected",
        "version": "3.0.0_p3"
      },
      {
        "status": "affected",
        "version": "3.0.0_p4"
      },
      {
        "status": "affected",
        "version": "3.0.0_p5"
      },
      {
        "status": "affected",
        "version": "3.0.0_p6"
      },
      {
        "status": "affected",
        "version": "3.0.0_p7"
      },
      {
        "status": "affected",
        "version": "3.0.0_p8"
      },
      {
        "status": "affected",
        "version": "3.1.0"
      },
      {
        "status": "affected",
        "version": "3.1.0_p1"
      },
      {
        "status": "affected",
        "version": "3.1.0_p3"
      },
      {
        "status": "affected",
        "version": "3.1.0_p2"
      },
      {
        "status": "affected",
        "version": "3.1.0_p4"
      },
      {
        "status": "affected",
        "version": "3.1.0_p5"
      },
      {
        "status": "affected",
        "version": "3.1.0_p6"
      },
      {
        "status": "affected",
        "version": "3.1.0_p7"
      },
      {
        "status": "affected",
        "version": "3.1.0_p8"
      },
      {
        "status": "affected",
        "version": "3.1.0_p9"
      },
      {
        "status": "affected",
        "version": "3.2.0"
      },
      {
        "status": "affected",
        "version": "3.2.0_p1"
      },
      {
        "status": "affected",
        "version": "3.2.0_p2"
      },
      {
        "status": "affected",
        "version": "3.2.0_p3"
      },
      {
        "status": "affected",
        "version": "3.2.0_p4"
      },
      {
        "status": "affected",
        "version": "3.2.0_p5"
      },
      {
        "status": "affected",
        "version": "3.2.0_p6"
      },
      {
        "status": "affected",
        "version": "3.3.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

4.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

AI Score

7.9

Confidence

High

EPSS

0

Percentile

9.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-20296