Home

Description

A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to modify parts of the configuration on an affected device. This vulnerability is due to the lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to modify descriptions of files on a specific page. To exploit this vulnerability, an attacker would need valid read-only Administrator credentials.

PUBLISHED Reserved 2024-10-10 | Published 2025-08-06 | Updated 2025-08-06 | Assigner cisco




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

Incorrect Authorization

Product status

Default status
unknown

3.1.0
affected

3.1.0 p1
affected

3.1.0 p3
affected

3.1.0 p2
affected

3.2.0
affected

3.1.0 p4
affected

2.7.0 p8
affected

3.1.0 p5
affected

3.2.0 p1
affected

3.1.0 p6
affected

3.2.0 p2
affected

3.1.0 p7
affected

3.3.0
affected

3.2.0 p3
affected

3.2.0 p4
affected

3.1.0 p8
affected

3.2.0 p5
affected

3.2.0 p6
affected

3.1.0 p9
affected

3.3 Patch 2
affected

3.3 Patch 1
affected

3.3 Patch 3
affected

3.4.0
affected

References

sec.cloudapps.cisco.com/...isco-sa-ise_xss_acc_cont-YsR4uT4U (cisco-sa-ise_xss_acc_cont-YsR4uT4U)

cve.org (CVE-2025-20332)

nvd.nist.gov (CVE-2025-20332)

Download JSON