8.8

CVE-2023-20272

A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to upload malicious files to the web root of the application. This vulnerability is due to insufficient file input validation. An attacker could exploit this vulnerability by uploading a malicious file to the web interface. A successful exploit could allow the attacker to replace files and gain access to sensitive server-side information.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoIdentity Services Engine Version3.0.0 Update-
CiscoIdentity Services Engine Version3.0.0 Updatepatch1
CiscoIdentity Services Engine Version3.0.0 Updatepatch2
CiscoIdentity Services Engine Version3.0.0 Updatepatch3
CiscoIdentity Services Engine Version3.0.0 Updatepatch4
CiscoIdentity Services Engine Version3.0.0 Updatepatch5
CiscoIdentity Services Engine Version3.0.0 Updatepatch6
CiscoIdentity Services Engine Version3.0.0 Updatepatch7
CiscoIdentity Services Engine Version3.1 Update-
CiscoIdentity Services Engine Version3.1 Updatepatch1
CiscoIdentity Services Engine Version3.1 Updatepatch2
CiscoIdentity Services Engine Version3.1 Updatepatch3
CiscoIdentity Services Engine Version3.1 Updatepatch4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.3% 0.507
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
psirt@cisco.com 6.7 1.2 5.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
CWE-424 Improper Protection of Alternate Path

The product does not sufficiently protect all possible paths that a user can take to access restricted functionality or resources.