{ "id": "CVE-2024-20527", "sourceIdentifier": "psirt@cisco.com", "published": "2024-11-06T17:15:17.147", "lastModified": "2024-11-06T18:17:17.287", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the API of Cisco ISE could allow an authenticated, remote attacker to read and delete arbitrary files on an affected device. To exploit this vulnerability, the attacker would need valid Super Admin credentials.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read or delete arbitrary files on the underlying operating system." }, { "lang": "es", "value": "Una vulnerabilidad en la API de Cisco ISE podr\u00eda permitir que un atacante remoto autenticado lea y elimine archivos arbitrarios en un dispositivo afectado. Para aprovechar esta vulnerabilidad, el atacante necesitar\u00eda credenciales de superadministrador v\u00e1lidas. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los par\u00e1metros proporcionados por el usuario en las solicitudes de API. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud de API manipulada a un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante leer o eliminar archivos arbitrarios en el sistema operativo subyacente." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@cisco.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 1.2, "impactScore": 4.2 } ] }, "weaknesses": [ { "source": "psirt@cisco.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy", "source": "psirt@cisco.com" } ] }