CVE-2022-20963
Published on: Not Yet Published
Last Modified on: 11/08/2022 03:43:00 PM UTC
CVE-2022-20963 - advisory for cisco-sa-ise-stor-xss-kpRBWXY
Source: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Identity Services Engine from Cisco contain the following vulnerability:
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid credentials to access the web-based management interface of an affected device.
- CVE-2022-20963 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
CVSS3 Score: 5.4 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
CHANGED | LOW | LOW | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
No Description Provided | tools.cisco.com text/html |
![]() |
Related QID Numbers
- 317258 Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability (cisco-sa-ise-stor-xss-kpRBWXY)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Cisco | Identity Services Engine | All | All | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | - | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch1 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch2 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch3 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch4 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch5 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch6 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch7 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | - | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch1 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch2 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch3 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch4 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch5 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch6 | All | All |
Application | Cisco | Identity Services Engine | 3.1 | - | All | All |
Application | Cisco | Identity Services Engine | 3.1 | patch1 | All | All |
Application | Cisco | Identity Services Engine | 3.1 | patch3 | All | All |
- cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-20963 : A vulnerability in the web-based management interface of Cisco Identity Services Engine ISE coul… twitter.com/i/web/status/1… | 2022-11-04 18:05:44 |
![]() |
CVE-2022-20963 | 2022-11-04 19:38:42 |