CVE-2022-20822
Cisco Identity Services Engine Unauthorized File Access Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to read and delete files on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains certain character sequences to an affected system. A successful exploit could allow the attacker to read or delete specific files on the device that their configured administrative level should not have access to. Cisco plans to release software updates that address this vulnerability.
Una vulnerabilidad en la interfaz de administración basada en la web de Cisco Identity Services Engine (ISE) podría permitir a un atacante remoto autenticado leer y eliminar archivos en un dispositivo afectado. Esta vulnerabilidad es debido a que no son comprobadas suficientemente las entradas proporcionadas por el usuario. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP diseñada que contenga determinadas secuencias de caracteres a un sistema afectado. Una explotación con éxito podría permitir al atacante leer o eliminar archivos específicos en el dispositivo a los que su nivel administrativo configurado no debería tener acceso. Cisco planea publicar actualizaciones de software que aborden esta vulnerabilidad
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2021-11-02 CVE Reserved
- 2022-10-26 CVE Published
- 2024-10-10 EPSS Updated
- 2024-10-15 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-path-traversal |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Identity Services Engine Search vendor "Cisco" for product "Identity Services Engine" | 3.1 Search vendor "Cisco" for product "Identity Services Engine" and version "3.1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Identity Services Engine Search vendor "Cisco" for product "Identity Services Engine" | 3.1 Search vendor "Cisco" for product "Identity Services Engine" and version "3.1" | patch1 |
Affected
| ||||||
Cisco Search vendor "Cisco" | Identity Services Engine Search vendor "Cisco" for product "Identity Services Engine" | 3.1 Search vendor "Cisco" for product "Identity Services Engine" and version "3.1" | patch3 |
Affected
| ||||||
Cisco Search vendor "Cisco" | Identity Services Engine Search vendor "Cisco" for product "Identity Services Engine" | 3.2 Search vendor "Cisco" for product "Identity Services Engine" and version "3.2" | - |
Affected
|