### [CVE-2022-20965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20965) ![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Identity%20Services%20Engine%20Software&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%202.6.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Incorrect%20Use%20of%20Privileged%20APIs&color=brighgreen) ### Description A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to take privileges actions within the web-based management interface. This vulnerability is due to improper access control on a feature within the web-based management interface of the affected system. An attacker could exploit this vulnerability by accessing features through direct requests, bypassing checks within the application. A successful exploit could allow the attacker to take privileged actions within the web-based management interface that should be otherwise restricted. {{value}} ["%7b%7bvalue%7d%7d"])}]] ### POC #### Reference - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/ #### Github No PoCs found on GitHub currently.