CVE-2022-20782
Published Apr 6, 2022
Last updated a year ago
Overview
- Description
- A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device. This vulnerability is due to improper enforcement of administrative privilege levels for high-value sensitive data. An attacker with read-only Administrator privileges to the web-based management interface on an affected device could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B45856E-6BE4-40A7-AE2F-4F9DC9315875" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F6D1780-3306-4481-A3CD-8F7732D955CC" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00756651-F667-4E4A-8024-3EAF003A9B92" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07BF9702-0607-49A1-A82A-E4ADF1A4135F" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11AA4EC0-6F3C-45A9-9AA4-0D81876F44B5" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B4B88F0-3229-4B07-9308-C37C794595A0" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E02F0E61-FBFF-4C6D-9132-E266FF67802B" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "541EC483-540A-4080-AA69-82A0F30EE3D6" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66CAFE97-295F-48F7-A92C-A90D3B837483" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68E172B4-867E-4413-9D45-F04B52270D41" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F22FABF-2831-4895-B0A9-283B98398F43" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B83D0F20-5A43-4583-AFAF-CD9D20352437" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2887A2C0-BADA-41D3-AA6A-F10BC58AA7F9" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5ADE32BD-C500-47D8-86D6-B08F55F1BBDF" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22F23314-96BE-42F6-AE07-CC13F8856029" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76265489-E5DC-46F1-9475-2FDFCEE32CF4" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9517A1B4-45BA-44DD-9122-C86BF9075EFE" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1063044-BCD7-487F-9880-141C30547E36" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA42E65A-7207-48B8-BE1B-0B352201BC09" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75DDAF38-4D5F-4EE4-A428-68D28FC0DA96" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5FB6AA6-F8C9-48A6-BDDA-1D25C43564EB" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B3A267A-5FEA-426D-903E-BD3F4F94A1A4" }, { "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4DB9726-532F-45CE-81FD-45F2F6C7CE51" } ], "operator": "OR" } ] } ]