fkie_cve-2024-20537
Vulnerability from fkie_nvd
Published
2024-11-06 17:15
Modified
2024-11-22 19:53
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to bypass the authorization mechanisms for specific administrative functions.
This vulnerability is due to a lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to conduct administrative functions beyond their intended access level. To exploit this vulnerability, an attacker would need Read-Only Administrator credentials.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*", matchCriteriaId: "A1063044-BCD7-487F-9880-141C30547E36", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*", matchCriteriaId: "DA42E65A-7207-48B8-BE1B-0B352201BC09", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*", matchCriteriaId: "75DDAF38-4D5F-4EE4-A428-68D28FC0DA96", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*", matchCriteriaId: "C5FB6AA6-F8C9-48A6-BDDA-1D25C43564EB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*", matchCriteriaId: "2B3A267A-5FEA-426D-903E-BD3F4F94A1A4", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*", matchCriteriaId: "B1B3207B-1B9C-41AA-8EF6-8478458462E7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*", matchCriteriaId: "C5B9E7F3-B0F2-4A6A-B939-A62E9B12CCEB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch7:*:*:*:*:*:*", matchCriteriaId: "EF4C5A58-D0AE-48D6-9757-18C1D5BE5070", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch8:*:*:*:*:*:*", matchCriteriaId: "0DB3133B-FBE4-47F3-88FD-9AC02AFB7EBB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*", matchCriteriaId: "7A789B44-7E6C-4FE9-BD40-702A871AB8AC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*", matchCriteriaId: "93920663-445E-4456-A905-81CEC6CA1833", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*", matchCriteriaId: "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*", matchCriteriaId: "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*", matchCriteriaId: "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*", matchCriteriaId: "E939B65A-7912-4C36-8799-03A1526D7BD3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*", matchCriteriaId: "833B438F-0869-4C0D-9952-750C00702E8D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*", matchCriteriaId: "E8B2588D-01F9-450B-B2E3-ADC4125E354E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*", matchCriteriaId: "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*", matchCriteriaId: "654E946A-07C5-4036-BC54-85EF42B808DD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", matchCriteriaId: "7932D5D5-83E1-4BEF-845A-D0783D4BB750", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", matchCriteriaId: "1B818846-4A6E-4256-B344-281E8C786C43", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", matchCriteriaId: "A44858A2-922A-425A-8B38-0C47DB911A3C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", matchCriteriaId: "53484A32-757B-42F8-B655-554C34222060", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", matchCriteriaId: "0CCAC61F-C273-49B3-A631-31D3AE3EB148", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*", matchCriteriaId: "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*", matchCriteriaId: "B452B4F0-8510-475E-9AE8-B48FABB4D7D3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", matchCriteriaId: "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", matchCriteriaId: "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*", matchCriteriaId: "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to bypass the authorization mechanisms for specific administrative functions.\r\n\r\nThis vulnerability is due to a lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to conduct administrative functions beyond their intended access level. To exploit this vulnerability, an attacker would need Read-Only Administrator credentials.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de Cisco ISE podría permitir que un atacante remoto autenticado eluda los mecanismos de autorización para funciones administrativas específicas. Esta vulnerabilidad se debe a la falta de validación del lado del servidor de los permisos de administrador. Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada a un sistema afectado. Una explotación exitosa podría permitir al atacante realizar funciones administrativas más allá de su nivel de acceso previsto. Para aprovechar esta vulnerabilidad, un atacante necesitaría credenciales de administrador de solo lectura.", }, ], id: "CVE-2024-20537", lastModified: "2024-11-22T19:53:29.893", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-11-06T17:15:19.350", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-BBRf7mkE", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-863", }, ], source: "psirt@cisco.com", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.