Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "776397EC-F775-4068-A811-D57FC2DDAF8C", "versionEndExcluding": "2.6.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "8B45856E-6BE4-40A7-AE2F-4F9DC9315875", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:*", "matchCriteriaId": "1F6D1780-3306-4481-A3CD-8F7732D955CC", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch10:*:*:*:*:*:*", "matchCriteriaId": "00756651-F667-4E4A-8024-3EAF003A9B92", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch11:*:*:*:*:*:*", "matchCriteriaId": "57E9CE5A-219F-4702-9E8A-074ED35BD252", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch12:*:*:*:*:*:*", "matchCriteriaId": "33C600DA-4F42-415E-8E7D-6A9EC0720252", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:*", "matchCriteriaId": "07BF9702-0607-49A1-A82A-E4ADF1A4135F", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:*", "matchCriteriaId": "11AA4EC0-6F3C-45A9-9AA4-0D81876F44B5", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*", "matchCriteriaId": "1B4B88F0-3229-4B07-9308-C37C794595A0", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*", "matchCriteriaId": "E02F0E61-FBFF-4C6D-9132-E266FF67802B", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*", "matchCriteriaId": "541EC483-540A-4080-AA69-82A0F30EE3D6", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*", "matchCriteriaId": "66CAFE97-295F-48F7-A92C-A90D3B837483", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*", "matchCriteriaId": "68E172B4-867E-4413-9D45-F04B52270D41", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*", "matchCriteriaId": "1F22FABF-2831-4895-B0A9-283B98398F43", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*", "matchCriteriaId": "B83D0F20-5A43-4583-AFAF-CD9D20352437", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*", "matchCriteriaId": "2887A2C0-BADA-41D3-AA6A-F10BC58AA7F9", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*", "matchCriteriaId": "5ADE32BD-C500-47D8-86D6-B08F55F1BBDF", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*", "matchCriteriaId": "22F23314-96BE-42F6-AE07-CC13F8856029", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*", "matchCriteriaId": "76265489-E5DC-46F1-9475-2FDFCEE32CF4", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*", "matchCriteriaId": "9517A1B4-45BA-44DD-9122-C86BF9075EFE", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:*", "matchCriteriaId": "1BC35A24-68DB-43C5-A817-9B35018F5990", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "A1063044-BCD7-487F-9880-141C30547E36", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*", "matchCriteriaId": "DA42E65A-7207-48B8-BE1B-0B352201BC09", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*", "matchCriteriaId": "75DDAF38-4D5F-4EE4-A428-68D28FC0DA96", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*", "matchCriteriaId": "C5FB6AA6-F8C9-48A6-BDDA-1D25C43564EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*", "matchCriteriaId": "2B3A267A-5FEA-426D-903E-BD3F4F94A1A4", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*", "matchCriteriaId": "B1B3207B-1B9C-41AA-8EF6-8478458462E7", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*", "matchCriteriaId": "C5B9E7F3-B0F2-4A6A-B939-A62E9B12CCEB", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*", "matchCriteriaId": "C4DB9726-532F-45CE-81FD-45F2F6C7CE51", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*", "matchCriteriaId": "2E8F0066-0EC0-41FD-80BE-55C4ED5F6B0E", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*", "matchCriteriaId": "5D1765DB-1BEF-4CE9-8B86-B91F709600EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:patch4:*:*:*:*:*:*", "matchCriteriaId": "3D1E80EF-C3FD-4F7A-B63D-0EAA5C878B11", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*", "matchCriteriaId": "36722B6C-64A5-4D00-94E1-442878C37A35", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system.\r\n\r This vulnerability is due to improper validation of user input within requests as part of the web-based management interface. An attacker could exploit this vulnerability by manipulating requests to the web-based management interface to contain operating system commands. A successful exploit could allow the attacker to execute arbitrary operating system commands on the underlying operating system with the privileges of the web services user.\r\n\r Cisco has not yet released software updates that address this vulnerability. "}, {"lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Identity Services Engine podr\u00eda permitir que un atacante remoto autenticado inyecte comandos arbitrarios en el sistema operativo subyacente. Esta vulnerabilidad se debe a una validaci\u00f3n inadecuada de la entrada del usuario dentro de las solicitudes como parte de la interfaz de administraci\u00f3n basada en web. Un atacante podr\u00eda aprovechar esta vulnerabilidad manipulando las solicitudes a la interfaz de administraci\u00f3n basada en web para que contenga comandos del sistema operativo. Un exploit exitoso podr\u00eda permitir al atacante ejecutar comandos arbitrarios del sistema operativo en el sistema operativo subyacente con los privilegios del usuario de servicios web. Cisco a\u00fan no ha publicado actualizaciones de software que aborden esta vulnerabilidad."}], "id": "CVE-2022-20964", "lastModified": "2024-11-21T06:43:55.800", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "ykramarz@cisco.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-01-20T07:15:10.743", "references": [{"source": "ykramarz@cisco.com", "tags": ["Vendor Advisory"], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx"}], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-78"}], "source": "ykramarz@cisco.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-78"}], "source": "nvd@nist.gov", "type": "Primary"}]}