CVE-2020-3589
08.10.2020, 05:15
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need to have valid administrative credentials.
Vendor | Product | Version |
---|---|---|
cisco | identity_services_engine | 2.2.0:patch16 |
cisco | identity_services_engine | 2.2.0.470:patch1 |
cisco | identity_services_engine | 2.2.0.470:patch10 |
cisco | identity_services_engine | 2.2.0.470:patch11 |
cisco | identity_services_engine | 2.2.0.470:patch12 |
cisco | identity_services_engine | 2.2.0.470:patch13 |
cisco | identity_services_engine | 2.2.0.470:patch14 |
cisco | identity_services_engine | 2.2.0.470:patch15 |
cisco | identity_services_engine | 2.2.0.470:patch16 |
cisco | identity_services_engine | 2.2.0.470:patch2 |
cisco | identity_services_engine | 2.2.0.470:patch3 |
cisco | identity_services_engine | 2.2.0.470:patch4 |
cisco | identity_services_engine | 2.2.0.470:patch5 |
cisco | identity_services_engine | 2.2.0.470:patch6 |
cisco | identity_services_engine | 2.2.0.470:patch7 |
cisco | identity_services_engine | 2.2.0.470:patch8 |
cisco | identity_services_engine | 2.2.0.470:patch9 |
cisco | identity_services_engine | 2.3.0:patch7 |
cisco | identity_services_engine | 2.3.0.298 |
cisco | identity_services_engine | 2.3.0.298:patch1 |
cisco | identity_services_engine | 2.3.0.298:patch2 |
cisco | identity_services_engine | 2.3.0.298:patch3 |
cisco | identity_services_engine | 2.3.0.298:patch4 |
cisco | identity_services_engine | 2.3.0.298:patch5 |
cisco | identity_services_engine | 2.3.0.298:patch6 |
cisco | identity_services_engine | 2.3.0.298:patch7 |
cisco | identity_services_engine | 2.4.0:patch12 |
cisco | identity_services_engine | 2.4.0.357 |
cisco | identity_services_engine | 2.4.0.357:patch1 |
cisco | identity_services_engine | 2.4.0.357:patch10 |
cisco | identity_services_engine | 2.4.0.357:patch2 |
cisco | identity_services_engine | 2.4.0.357:patch3 |
cisco | identity_services_engine | 2.4.0.357:patch4 |
cisco | identity_services_engine | 2.4.0.357:patch5 |
cisco | identity_services_engine | 2.4.0.357:patch6 |
cisco | identity_services_engine | 2.4.0.357:patch7 |
cisco | identity_services_engine | 2.4.0.357:patch8 |
cisco | identity_services_engine | 2.4.0.357:patch9 |
cisco | identity_services_engine | 2.6.0 |
cisco | identity_services_engine | 2.6.0:patch1 |
cisco | identity_services_engine | 2.6.0:patch2 |
cisco | identity_services_engine | 2.6.0:patch3 |
cisco | identity_services_engine | 2.6.0:patch5 |
cisco | identity_services_engine | 2.6.0:patch6 |
cisco | identity_services_engine | 2.6.0:patch7 |
cisco | identity_services_engine | 2.6.0.156:patch1 |
cisco | identity_services_engine | 2.6.0.156:patch2 |
cisco | identity_services_engine | 2.6.0.156:patch3 |
cisco | identity_services_engine | 2.6.0.156:patch5 |
cisco | identity_services_engine | 2.6.0.156:patch6 |
cisco | identity_services_engine | 2.6.0.156:patch7 |
cisco | identity_services_engine | 2.7.0:patch2 |
𝑥
= Vulnerable software versions