Issued: Sunday, 23 October, 2022 |
Last Revision: Sunday, 23 October, 2022 |
Vendor: |
Product: |
Severity Level: |
Cisco alert, admins of Cisco Identity Services Engine solutions, about two vulnerabilities that could be exploited to read and delete files on an affected device and to execute arbitrary script or access sensitive information.
CVE-2022-20822 is a path traversal vulnerability in the web – based management interface of Cisco ISE that could be exploited by an authenticated, remote attacker.
CVE-2022-20959 is a cross-site scripting vulnerability in Cisco ISE’s External RESTful Services API. An attacker could exploit this vulnerability by persuading an authenticated administrator of the web-based management interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browserbased information.
| CVE/Vulnerability | Description | CVSS 3.1 Base Score | Exploitable |
| |
| CVE-2022-20822 | Cisco Identity Services Engine Unauthorized File Access Vulnerability | 7.1 | No |
| |
| CVE-2022-20959 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 6.1 | No |
| |
Table 1: Vulnerability details
| CVE/Vulnerability | Product(s) Detail |
| |
| CVE-2022-20822 | Cisco ISE. |
| |
| CVE-2022-20959 |
| ||
Table 2: Vulnerable versions
There are no workarounds available for the two flaws. And, while there’s currently a fix for CVE-2022-20959 (for one specific ISE version and patch level), other fixes are scheduled to be released in the coming months – some even in January 2023.
There are hot patches available on request, and Cisco is offering them to interested parties after they get in touch with Cisco’s Technical Assistance Center.
We advise the entities to must follow the “Cisco- advisory”.
