4.9
CVE-2025-20305
- EPSS 0.04%
- Veröffentlicht 05.11.2025 16:32:52
- Zuletzt bearbeitet 19.11.2025 15:02:15
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to obtain sensitive information from an affected device. This vulnerability exists because certain files lack proper data protection mechanisms. An attacker with read-only Administrator privileges could exploit this vulnerability by performing actions where the results should only be viewable to a high-privileged user. A successful exploit could allow the attacker to view passwords that are normally not visible to read-only administrators.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Identity Services Engine Version <= 3.1.0
Cisco ≫ Identity Services Engine Version3.2.0 Update-
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch3
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch4
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch5
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch6
Cisco ≫ Identity Services Engine Version3.2.0 Updatepatch7
Cisco ≫ Identity Services Engine Version3.3.0 Update-
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch3
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch4
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch5
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch6
Cisco ≫ Identity Services Engine Version3.3.0 Updatepatch7
Cisco ≫ Identity Services Engine Version3.4.0 Update-
Cisco ≫ Identity Services Engine Version3.4.0 Updatepatch1
Cisco ≫ Identity Services Engine Version3.4.0 Updatepatch2
Cisco ≫ Identity Services Engine Version3.4.0 Updatepatch3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.121 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
| psirt@cisco.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|
CWE-1220 Insufficient Granularity of Access Control
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.