A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to access sensitive information.
This vulnerability is due to the improper storage of sensitive information within the web-based management interface. An attacker could exploit this vulnerability by logging in to the web-based management interface and viewing hidden fields within the application. A successful exploit could allow the attacker to access sensitive information, including device entry credentials, that could aid the attacker in further attacks.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-credentials-tkTO3h3 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
23 Aug 2023, 20:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch9:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:* |
|
First Time |
Cisco
Cisco identity Services Engine |
|
References | (MISC) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-credentials-tkTO3h3 - Vendor Advisory | |
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
16 Aug 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-16 22:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-20111
Mitre link : CVE-2023-20111
CVE.ORG link : CVE-2023-20111
JSON object : View
Products Affected
cisco
- identity_services_engine
CWE