CVE-2022-20967
Published on: Not Yet Published
Last Modified on: 01/26/2023 06:13:00 PM UTC
Certain versions of Identity Services Engine from Cisco contain the following vulnerability:
A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface. This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks. Cisco has not yet released software updates that address this vulnerability.
- CVE-2022-20967 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- The Cisco PSIRT is aware that proof-of-concept exploit code for the vulnerabilities that are described in this advisory will become available after software fixes are released. Public reports of the vulnerabilities, including a description and classification without specific technical details, may become available after this advisory is published. The Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.
CVSS3 Score: 5.4 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
CHANGED | LOW | LOW | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Cisco Identity Services Engine Vulnerabilities | sec.cloudapps.cisco.com text/html |
![]() |
Related QID Numbers
- 317276 Cisco Identity Services Engine (ISE) Multiple Vulnerabilities (cisco-sa-ise-7Q4TNYUx)
Exploit/POC from Github
A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated,…
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Cisco | Identity Services Engine | All | All | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | - | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch1 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch10 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch11 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch12 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch2 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch3 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch5 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch6 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch7 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch8 | All | All |
Application | Cisco | Identity Services Engine | 2.6.0 | patch9 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | - | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch1 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch2 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch3 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch4 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch5 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch6 | All | All |
Application | Cisco | Identity Services Engine | 2.7.0 | patch7 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | - | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch1 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch2 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch3 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch4 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch5 | All | All |
Application | Cisco | Identity Services Engine | 3.0.0 | patch6 | All | All |
Application | Cisco | Identity Services Engine | 3.1 | - | All | All |
Application | Cisco | Identity Services Engine | 3.1 | patch1 | All | All |
Application | Cisco | Identity Services Engine | 3.1 | patch3 | All | All |
Application | Cisco | Identity Services Engine | 3.1 | patch4 | All | All |
Application | Cisco | Identity Services Engine | 3.2 | - | All | All |
- cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch10:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch11:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch12:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.1:patch4:*:*:*:*:*:*:
- cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-20967 | 2023-01-20 07:38:57 |