Coming Soon...

Q-CERT website is currently under maintenance. We should be back shortly. Thank you for yor patience.

Vulnerabilities in Cisco Identity Services Engine

Issued: 
Sunday, 23 October, 2022
Last Revision: 
Sunday, 23 October, 2022
Vendor: 
Product: 
Severity Level: 
Summary: 

Cisco alert, admins of Cisco Identity Services Engine solutions, about two vulnerabilities that could be exploited to read and delete files on an affected device and to execute arbitrary script or access sensitive information.

 

CVE-2022-20822 is a path traversal vulnerability in the web – based management interface of Cisco ISE that could be exploited by an authenticated, remote attacker.

 

CVE-2022-20959 is a cross-site scripting vulnerability in Cisco ISE’s External RESTful Services API. An attacker could exploit this vulnerability by persuading an authenticated administrator of the web-based management interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browserbased information.

 

 

CVE/Vulnerability

Description

CVSS 3.1

Base

Score

Exploitable

 

 

CVE-2022-20822

Cisco Identity Services Engine

Unauthorized File Access Vulnerability

7.1

No

 

 

CVE-2022-20959

Cisco Identity Services Engine Cross-Site Scripting Vulnerability

6.1

No

 

       

 

Table 1: Vulnerability details

 

 

 

CVE/Vulnerability

Product(s) Detail 

 

 

CVE-2022-20822

Cisco ISE.

 

 

CVE-2022-20959

 

     

 

Table 2: Vulnerable versions

 

Recommendation: 

There are no workarounds available for the two flaws. And, while there’s currently a fix for CVE-2022-20959 (for one specific ISE version and patch level), other fixes are scheduled to be released in the coming months – some even in January 2023.

There are hot patches available on request, and Cisco is offering them to interested parties after they get in touch with Cisco’s Technical Assistance Center.

We advise the entities to must follow the “Cisco- advisory”.