CVE-2024-20476
06.11.2024, 17:15
A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to bypass the authorization mechanisms for specific file management functions. This vulnerability is due to lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to upload files to a location that should be restricted. To exploit this vulnerability, an attacker would need valid Read-Only Administrator credentials.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | identity_services_engine | 𝑥 < 3.1 |
cisco | identity_services_engine | 3.1.0 |
cisco | identity_services_engine | 3.1.0:patch1 |
cisco | identity_services_engine | 3.1.0:patch2 |
cisco | identity_services_engine | 3.1.0:patch3 |
cisco | identity_services_engine | 3.1.0:patch4 |
cisco | identity_services_engine | 3.1.0:patch5 |
cisco | identity_services_engine | 3.1.0:patch6 |
cisco | identity_services_engine | 3.1.0:patch7 |
cisco | identity_services_engine | 3.1.0:patch8 |
cisco | identity_services_engine | 3.1.0:patch9 |
cisco | identity_services_engine | 3.2.0 |
cisco | identity_services_engine | 3.2.0:patch1 |
cisco | identity_services_engine | 3.2.0:patch2 |
cisco | identity_services_engine | 3.2.0:patch3 |
cisco | identity_services_engine | 3.2.0:patch4 |
cisco | identity_services_engine | 3.2.0:patch5 |
cisco | identity_services_engine | 3.2.0:patch6 |
cisco | identity_services_engine | 3.3.0 |
cisco | identity_services_engine | 3.3.0:patch1 |
cisco | identity_services_engine | 3.3.0:patch2 |
cisco | identity_services_engine | 3.3.0:patch3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration