CVE-2024-20466
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/08/2024
Last modified:
31/03/2025
Description
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device. <br />
<br />
This vulnerability is due to improper enforcement of administrative privilege levels for high-value sensitive data. An attacker with read-only Administrator privileges for the web-based management interface on an affected device could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:* | 2.7.0 (including) | 3.1 (excluding) |
| cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



