CVE-2024-20531
Severity CVSS v4.0:
Pending analysis
Type:
CWE-611
Improper Restriction of XML External Entity Reference ('XXE')
Publication date:
06/11/2024
Last modified:
20/11/2024
Description
A vulnerability in the API of Cisco ISE could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device and conduct a server-side request forgery (SSRF) attack through an affected device. To exploit this vulnerability, the attacker would need valid Super Admin credentials.<br />
<br />
This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing XML input. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system or conduct an SSRF attack through the affected device.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch7:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch8:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page