Lucene search

K
vulnrichmentCiscoVULNRICHMENT:CVE-2024-20479
HistoryAug 07, 2024 - 4:43 p.m.

CVE-2024-20479

2024-08-0716:43:57
cisco
github.com
2
cisco ise
web interface
authenticated attacker
xss attack
user input
insufficient validation
malicious code
sensitive information
admin privileges
cve-2024-20479

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

AI Score

6.6

Confidence

High

EPSS

0

Percentile

14.7%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.

This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have Admin privileges on an affected device.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Identity Services Engine Software",
    "versions": [
      {
        "status": "affected",
        "version": "2.7.0"
      },
      {
        "status": "affected",
        "version": "2.7.0 p1"
      },
      {
        "status": "affected",
        "version": "2.7.0 p2"
      },
      {
        "status": "affected",
        "version": "2.7.0 p3"
      },
      {
        "status": "affected",
        "version": "2.7.0 p4"
      },
      {
        "status": "affected",
        "version": "2.7.0 p5"
      },
      {
        "status": "affected",
        "version": "2.7.0 p6"
      },
      {
        "status": "affected",
        "version": "2.7.0 p7"
      },
      {
        "status": "affected",
        "version": "2.7.0 p8"
      },
      {
        "status": "affected",
        "version": "2.7.0 p9"
      },
      {
        "status": "affected",
        "version": "2.7.0 p10"
      },
      {
        "status": "affected",
        "version": "3.0.0"
      },
      {
        "status": "affected",
        "version": "3.0.0 p1"
      },
      {
        "status": "affected",
        "version": "3.0.0 p2"
      },
      {
        "status": "affected",
        "version": "3.0.0 p3"
      },
      {
        "status": "affected",
        "version": "3.0.0 p4"
      },
      {
        "status": "affected",
        "version": "3.0.0 p5"
      },
      {
        "status": "affected",
        "version": "3.0.0 p6"
      },
      {
        "status": "affected",
        "version": "3.0.0 p7"
      },
      {
        "status": "affected",
        "version": "3.0.0 p8"
      },
      {
        "status": "affected",
        "version": "3.1.0"
      },
      {
        "status": "affected",
        "version": "3.1.0 p1"
      },
      {
        "status": "affected",
        "version": "3.1.0 p3"
      },
      {
        "status": "affected",
        "version": "3.1.0 p2"
      },
      {
        "status": "affected",
        "version": "3.1.0 p4"
      },
      {
        "status": "affected",
        "version": "3.1.0 p5"
      },
      {
        "status": "affected",
        "version": "3.1.0 p6"
      },
      {
        "status": "affected",
        "version": "3.1.0 p7"
      },
      {
        "status": "affected",
        "version": "3.1.0 p8"
      },
      {
        "status": "affected",
        "version": "3.2.0"
      },
      {
        "status": "affected",
        "version": "3.2.0 p1"
      },
      {
        "status": "affected",
        "version": "3.2.0 p2"
      },
      {
        "status": "affected",
        "version": "3.2.0 p3"
      },
      {
        "status": "affected",
        "version": "3.2.0 p4"
      },
      {
        "status": "affected",
        "version": "3.2.0 p5"
      },
      {
        "status": "affected",
        "version": "3.2.0 p6"
      },
      {
        "status": "affected",
        "version": "3.3.0"
      },
      {
        "status": "affected",
        "version": "3.3 Patch 2"
      },
      {
        "status": "affected",
        "version": "3.3 Patch 1"
      }
    ]
  }
]

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

AI Score

6.6

Confidence

High

EPSS

0

Percentile

14.7%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-20479