Lucene search

K
vulnrichmentCiscoVULNRICHMENT:CVE-2024-20469
HistorySep 04, 2024 - 4:28 p.m.

CVE-2024-20469 Cisco Identity Services Engine Command Injection Vulnerability

2024-09-0416:28:56
cisco
github.com
39
cisco
identity services engine
command injection
vulnerability
cli commands
authenticated attacker
local attacker
operating system
elevate privileges
administrator privileges
user-supplied input
exploit

CVSS3

6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

7.4

Confidence

High

EPSS

0

Percentile

10.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A vulnerability in specific CLI commands in Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have valid Administrator privileges on an affected device.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:cisco:identity_services_engine_software:*:*:*:*:*:*:*:*"
    ],
    "vendor": "cisco",
    "product": "identity_services_engine_software",
    "versions": [
      {
        "status": "affected",
        "version": "3.2.0"
      },
      {
        "status": "affected",
        "version": "3.2.0p1"
      },
      {
        "status": "affected",
        "version": "3.2.0p2"
      },
      {
        "status": "affected",
        "version": "3.2.0p3"
      },
      {
        "status": "affected",
        "version": "3.2.0p4"
      },
      {
        "status": "affected",
        "version": "3.2.0p5"
      },
      {
        "status": "affected",
        "version": "3.2.0p6"
      },
      {
        "status": "affected",
        "version": "3.3.0"
      },
      {
        "status": "affected",
        "version": "3.3p1"
      },
      {
        "status": "affected",
        "version": "3.3p2"
      },
      {
        "status": "affected",
        "version": "3.3p3"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

7.4

Confidence

High

EPSS

0

Percentile

10.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-20469