CVE-2021-34759
02.09.2021, 03:15
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need valid administrative credentials.
Vendor | Product | Version |
---|---|---|
cisco | identity_services_engine | 𝑥 < 2.2.0 |
cisco | identity_services_engine | 2.2.0 |
cisco | identity_services_engine | 2.2.0:patch1 |
cisco | identity_services_engine | 2.2.0:patch10 |
cisco | identity_services_engine | 2.2.0:patch12 |
cisco | identity_services_engine | 2.2.0:patch13 |
cisco | identity_services_engine | 2.2.0:patch14 |
cisco | identity_services_engine | 2.2.0:patch15 |
cisco | identity_services_engine | 2.2.0:patch16 |
cisco | identity_services_engine | 2.2.0:patch17 |
cisco | identity_services_engine | 2.2.0:patch2 |
cisco | identity_services_engine | 2.2.0:patch3 |
cisco | identity_services_engine | 2.2.0:patch4 |
cisco | identity_services_engine | 2.2.0:patch5 |
cisco | identity_services_engine | 2.2.0:patch6 |
cisco | identity_services_engine | 2.2.0:patch7 |
cisco | identity_services_engine | 2.2.0:patch8 |
cisco | identity_services_engine | 2.2.0:patch9 |
cisco | identity_services_engine | 2.3.0 |
cisco | identity_services_engine | 2.3.0:patch1 |
cisco | identity_services_engine | 2.3.0:patch2 |
cisco | identity_services_engine | 2.3.0:patch3 |
cisco | identity_services_engine | 2.3.0:patch4 |
cisco | identity_services_engine | 2.3.0:patch5 |
cisco | identity_services_engine | 2.3.0:patch6 |
cisco | identity_services_engine | 2.3.0:patch7 |
cisco | identity_services_engine | 2.4.0 |
cisco | identity_services_engine | 2.4.0:patch1 |
cisco | identity_services_engine | 2.4.0:patch10 |
cisco | identity_services_engine | 2.4.0:patch11 |
cisco | identity_services_engine | 2.4.0:patch12 |
cisco | identity_services_engine | 2.4.0:patch13 |
cisco | identity_services_engine | 2.4.0:patch14 |
cisco | identity_services_engine | 2.4.0:patch2 |
cisco | identity_services_engine | 2.4.0:patch3 |
cisco | identity_services_engine | 2.4.0:patch4 |
cisco | identity_services_engine | 2.4.0:patch5 |
cisco | identity_services_engine | 2.4.0:patch6 |
cisco | identity_services_engine | 2.4.0:patch7 |
cisco | identity_services_engine | 2.4.0:patch8 |
cisco | identity_services_engine | 2.4.0:patch9 |
cisco | identity_services_engine | 2.6.0 |
cisco | identity_services_engine | 2.6.0:patch1 |
cisco | identity_services_engine | 2.6.0:patch2 |
cisco | identity_services_engine | 2.6.0:patch3 |
cisco | identity_services_engine | 2.6.0:patch5 |
cisco | identity_services_engine | 2.6.0:patch6 |
cisco | identity_services_engine | 2.6.0:patch7 |
cisco | identity_services_engine | 2.6.0:patch8 |
cisco | identity_services_engine | 2.6.0:patch9 |
cisco | identity_services_engine | 2.7.0:patch1 |
cisco | identity_services_engine | 2.7.0:patch2 |
cisco | identity_services_engine | 2.7.0:patch3 |
cisco | identity_services_engine | 2.7.0:patch4 |
cisco | identity_services_engine | 3.0.0:patch1 |
cisco | identity_services_engine | 3.0.0:patch2 |
cisco | identity_services_engine | 3.0.0:patch3 |
𝑥
= Vulnerable software versions