cve/2022/CVE-2022-20965.md

19 lines
1.4 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-20965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20965)
![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Identity%20Services%20Engine%20Software&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.6.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Incorrect%20Use%20of%20Privileged%20APIs&color=brighgreen)
### Description
2024-06-22 09:37:59 +00:00
A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to take privileges actions within the web-based management interface. This vulnerability is due to improper access control on a feature within the web-based management interface of the affected system. An attacker could exploit this vulnerability by accessing features through direct requests, bypassing checks within the application. A successful exploit could allow the attacker to take privileged actions within the web-based management interface that should be otherwise restricted. {{value}} ["%7b%7bvalue%7d%7d"])}]]
2024-05-25 21:48:12 +02:00
### POC
#### Reference
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx
- https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/
#### Github
No PoCs found on GitHub currently.