Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-08625

Опубликовано: 01 нояб. 2023
Источник: fstec
CVSS3: 4.7
CVSS2: 5.8
EPSS Низкий

Описание

Уязвимость платформы управления политиками соединений Cisco Identity Services Engine (ISE) связана с неограниченной загрузкой файлов опасного типа. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить произвольный код

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco Identity Services Engine

Версия ПО

3.1 (Cisco Identity Services Engine)
3.2 (Cisco Identity Services Engine)
2.7.0 (Cisco Identity Services Engine)
2.7.0 P1 (Cisco Identity Services Engine)
2.7.0 P2 (Cisco Identity Services Engine)
2.7.0 P3 (Cisco Identity Services Engine)
2.7.0 P4 (Cisco Identity Services Engine)
2.7.0 P5 (Cisco Identity Services Engine)
2.7.0 P6 (Cisco Identity Services Engine)
2.7.0 P7 (Cisco Identity Services Engine)
2.7.0 P8 (Cisco Identity Services Engine)
2.7.0 P9 (Cisco Identity Services Engine)
3.0.0 (Cisco Identity Services Engine)
3.0.0 P1 (Cisco Identity Services Engine)
3.0.0 P2 (Cisco Identity Services Engine)
3.0.0 P3 (Cisco Identity Services Engine)
3.0.0 P4 (Cisco Identity Services Engine)
3.0.0 P5 (Cisco Identity Services Engine)
3.0.0 P6 (Cisco Identity Services Engine)
3.0.0 P7 (Cisco Identity Services Engine)
3.1 P1 (Cisco Identity Services Engine)
3.1 P2 (Cisco Identity Services Engine)
3.1 P3 (Cisco Identity Services Engine)
3.1 P4 (Cisco Identity Services Engine)
3.1 P5 (Cisco Identity Services Engine)
3.1 P6 (Cisco Identity Services Engine)
3.1 P7 (Cisco Identity Services Engine)
3.2 P1 (Cisco Identity Services Engine)
3.2 P2 (Cisco Identity Services Engine)

Тип ПО

ПО сетевого программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 5,8)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 4,7)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 62%
0.00423
Низкий

4.7 Medium

CVSS3

5.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 4.7
nvd
больше 2 лет назад

Two vulnerabilities in Cisco ISE could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. These vulnerabilities are due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit these vulnerabilities by uploading a crafted file to an affected device. A successful exploit could allow the attacker to store malicious files in specific directories on the device. The attacker could later use those files to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.

CVSS3: 4.7
github
больше 2 лет назад

Two vulnerabilities in Cisco ISE could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. These vulnerabilities are due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit these vulnerabilities by uploading a crafted file to an affected device. A successful exploit could allow the attacker to store malicious files in specific directories on the device. The attacker could later use those files to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.

EPSS

Процентиль: 62%
0.00423
Низкий

4.7 Medium

CVSS3

5.8 Medium

CVSS2