CVE-2019-15281
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
16/10/2019
Last modified:
22/10/2019
Description
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The attacker must have valid administrator credentials. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by injecting malicious code into a troubleshooting file. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Impact
Base Score 3.x
4.80
Severity 3.x
MEDIUM
Base Score 2.0
3.50
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cisco:identity_services_engine_software:*:*:*:*:*:*:*:* | 2.4\(0.357\) (excluding) | |
cpe:2.3:a:cisco:identity_services_engine_software:2.4\(0.357\):-:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_software:2.4\(0.357\):patch1:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_software:2.4\(0.357\):patch2:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_software:2.4\(0.357\):patch3:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_software:2.4\(0.357\):patch4:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_software:2.4\(0.357\):patch5:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_software:2.4\(0.357\):patch6:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_software:2.4\(0.357\):patch7:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_software:2.4\(0.357\):patch8:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine_software:2.4\(0.357\):patch9:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page