CVE-2022-20914
Published on: Not Yet Published
Last Modified on: 08/12/2022 06:20:00 PM UTC
CVE-2022-20914 - advisory for cisco-sa-ise-pwd-WH64AhQF
Source: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Identity Services Engine from Cisco contain the following vulnerability:
A vulnerability in the External RESTful Services (ERS) API of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to obtain sensitive information. This vulnerability is due to excessive verbosity in a specific REST API output. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain sensitive information, including administrative credentials for an external authentication server. Note: To successfully exploit this vulnerability, the attacker must have valid ERS administrative credentials.
- CVE-2022-20914 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- The Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.
- Affected Vendor/Software:
Cisco - Cisco Identity Services Engine Software version n/a
CVSS3 Score: 4.9 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | HIGH | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
No Description Provided | tools.cisco.com text/html |
![]() |
Related QID Numbers
- 317213 Cisco Identity Services Engine (ISE) Sensitive Information Disclosure Vulnerability (cisco-sa-ise-pwd-WH64AhQF)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Cisco | Identity Services Engine | All | All | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | - | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch1 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch10 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch2 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch3 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch5 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch6 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch7 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch8 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch9 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | - | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch1 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch2 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch3 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch4 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch5 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch6 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch7 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | - | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch1 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch2 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch3 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch4 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch5 | All | All |
Application | Cisco | Identity Services Engine | 3.1 | - | All | All |
Application | Cisco | Identity Services Engine | 3.1 | patch1 | All | All |
- cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch10:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
Cisco ISE Software の ERS API の処理に情報漏洩の問題 (CVE-2022-20914) [42963] sid.softek.jp/content/show/4… #SIDfm #脆弱性情報 | 2022-08-04 07:30:12 |
![]() |
CVE-2022-20914 : A vulnerability in the External RESTful Services ERS API of Cisco Identity Services Engine IS… twitter.com/i/web/status/1… | 2022-08-10 08:21:42 |
![]() |
CVE-2022-20914 | 2022-08-10 09:38:08 |