cvelist/2022/20xxx/CVE-2022-20965.json
2024-01-25 17:01:55 +00:00

223 lines
11 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-20965",
"ASSIGNER": "psirt@cisco.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to take privileges actions within the web-based management interface.\r\n\r This vulnerability is due to improper access control on a feature within the web-based management interface of the affected system. An attacker could exploit this vulnerability by accessing features through direct requests, bypassing checks within the application. A successful exploit could allow the attacker to take privileged actions within the web-based management interface that should be otherwise restricted.\r\n\r \r\n\r {{value}} [\"%7b%7bvalue%7d%7d\"])}]]\r\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Incorrect Use of Privileged APIs",
"cweId": "CWE-648"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Cisco",
"product": {
"product_data": [
{
"product_name": "Cisco Identity Services Engine Software",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2.6.0"
},
{
"version_affected": "=",
"version_value": "2.6.0 p1"
},
{
"version_affected": "=",
"version_value": "2.6.0 p2"
},
{
"version_affected": "=",
"version_value": "2.6.0 p3"
},
{
"version_affected": "=",
"version_value": "2.6.0 p5"
},
{
"version_affected": "=",
"version_value": "2.6.0 p6"
},
{
"version_affected": "=",
"version_value": "2.6.0 p7"
},
{
"version_affected": "=",
"version_value": "2.6.0 p8"
},
{
"version_affected": "=",
"version_value": "2.6.0 p9"
},
{
"version_affected": "=",
"version_value": "2.6.0 p10"
},
{
"version_affected": "=",
"version_value": "2.6.0 p11"
},
{
"version_affected": "=",
"version_value": "2.6.0 p12"
},
{
"version_affected": "=",
"version_value": "2.7.0"
},
{
"version_affected": "=",
"version_value": "2.7.0 p1"
},
{
"version_affected": "=",
"version_value": "2.7.0 p2"
},
{
"version_affected": "=",
"version_value": "2.7.0 p3"
},
{
"version_affected": "=",
"version_value": "2.7.0 p4"
},
{
"version_affected": "=",
"version_value": "2.7.0 p5"
},
{
"version_affected": "=",
"version_value": "2.7.0 p6"
},
{
"version_affected": "=",
"version_value": "2.7.0 p7"
},
{
"version_affected": "=",
"version_value": "3.0.0"
},
{
"version_affected": "=",
"version_value": "3.0.0 p1"
},
{
"version_affected": "=",
"version_value": "3.0.0 p2"
},
{
"version_affected": "=",
"version_value": "3.0.0 p3"
},
{
"version_affected": "=",
"version_value": "3.0.0 p4"
},
{
"version_affected": "=",
"version_value": "3.0.0 p5"
},
{
"version_affected": "=",
"version_value": "3.0.0 p6"
},
{
"version_affected": "=",
"version_value": "3.1.0"
},
{
"version_affected": "=",
"version_value": "3.1.0 p1"
},
{
"version_affected": "=",
"version_value": "3.1.0 p3"
},
{
"version_affected": "=",
"version_value": "3.1.0 p4"
},
{
"version_affected": "=",
"version_value": "3.1.0 p5"
},
{
"version_affected": "=",
"version_value": "3.2.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx",
"refsource": "MISC",
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx"
}
]
},
"source": {
"advisory": "cisco-sa-ise-7Q4TNYUx",
"discovery": "EXTERNAL",
"defects": [
"CSCwc98828"
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory."
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
}
]
}
}