Home

Description

A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to bypass the authorization mechanisms for specific file management functions. This vulnerability is due to lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to upload files to a location that should be restricted. To exploit this vulnerability, an attacker would need valid Read-Only Administrator credentials.

PUBLISHED Reserved 2023-11-08 | Published 2024-11-06 | Updated 2024-11-06 | Assigner cisco




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

Client-Side Enforcement of Server-Side Security

Product status

Default status
unknown

3.0.0
affected

3.0.0 p1
affected

3.0.0 p2
affected

3.0.0 p3
affected

3.1.0
affected

3.0.0 p4
affected

3.1.0 p1
affected

3.0.0 p5
affected

3.1.0 p3
affected

3.1.0 p2
affected

3.0.0 p6
affected

3.2.0
affected

3.1.0 p4
affected

2.7.0 p8
affected

3.1.0 p5
affected

3.2.0 p1
affected

3.0.0 p7
affected

3.1.0 p6
affected

3.2.0 p2
affected

3.1.0 p7
affected

3.3.0
affected

3.2.0 p3
affected

3.0.0 p8
affected

3.2.0 p4
affected

3.1.0 p8
affected

3.2.0 p5
affected

3.2.0 p6
affected

3.1.0 p9
affected

3.3 Patch 2
affected

3.3 Patch 1
affected

3.3 Patch 3
affected

References

sec.cloudapps.cisco.com/...cisco-sa-ise-multi-vulns-AF544ED5 (cisco-sa-ise-multi-vulns-AF544ED5)

cve.org (CVE-2024-20476)

nvd.nist.gov (CVE-2024-20476)

Download JSON