Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-6323

Опубликовано: 15 янв. 2016
Источник: nvd
CVSS3: 9.8
CVSS2: 10
EPSS Низкий

Описание

The Admin portal in Cisco Identity Services Engine (ISE) 1.1.x, 1.2.0 before patch 17, 1.2.1 before patch 8, 1.3 before patch 5, and 1.4 before patch 4 allows remote attackers to obtain administrative access via unspecified vectors, aka Bug ID CSCuw34253.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p2:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p3:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p4:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p5:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p6:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p2:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p3:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p4:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p5:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p6:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p7:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p8:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p9:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p2:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p3:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p4:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p5:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p6:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p7:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p2:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p3:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p4:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p5:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p6:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p7:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.1_base:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.2\(0.747\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.2\(0.793\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.2\(1.198\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.2\(1.901\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.2.0.899:p14:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.2.1:p1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.2.1:p2:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.2_base:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.3\(0.722\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.3\(0.876\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.3\(106.146\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.3\(120.135\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.4\(0.109\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.4\(0.181\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine_software:1.4\(0.253\):*:*:*:*:*:*:*

EPSS

Процентиль: 81%
0.01486
Низкий

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 9.8
github
больше 3 лет назад

The Admin portal in Cisco Identity Services Engine (ISE) 1.1.x, 1.2.0 before patch 17, 1.2.1 before patch 8, 1.3 before patch 5, and 1.4 before patch 4 allows remote attackers to obtain administrative access via unspecified vectors, aka Bug ID CSCuw34253.

fstec
около 10 лет назад

Уязвимость платформы управления политиками соединений Cisco Identity Services Engine, позволяющая нарушителю получить права администратора

EPSS

Процентиль: 81%
0.01486
Низкий

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

NVD-CWE-noinfo