A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.
Metrics
Affected Vendors & Products
References
History
Fri, 23 Aug 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco identity Services Engine |
|
CPEs | cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch10:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch9:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3:patch2:*:*:*:*:*:* |
|
Vendors & Products |
Cisco
Cisco identity Services Engine |
Wed, 07 Aug 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 07 Aug 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device. | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2024-08-07T16:42:05.023Z
Updated: 2024-08-08T03:55:30.688Z
Reserved: 2023-11-08T15:08:07.677Z
Link: CVE-2024-20443
Vulnrichment
Updated: 2024-08-07T18:13:13.337Z
NVD
Status : Analyzed
Published: 2024-08-07T17:15:50.053
Modified: 2024-08-23T15:18:06.347
Link: CVE-2024-20443
Redhat
No data.