Vulnerability Name:

CVE-2022-20782 (CCN-223538)

Assigned:2021-11-02
Published:2022-04-06
Updated:2022-04-14
Summary:A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device. This vulnerability is due to improper enforcement of administrative privilege levels for high-value sensitive data. An attacker with read-only Administrator privileges to the web-based management interface on an affected device could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-269
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2022-20782

Source: XF
Type: UNKNOWN
cisco-cve202220782-info-disc(223538)

Source: CCN
Type: Cisco Security Advisory cisco-sa-info-exp-YXAWYP3s
Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability

Source: CISCO
Type: Vendor Advisory
20220406 Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:cisco:identity_services_engine:2.6.0:-:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.6.0:patch10:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*
  • OR cpe:/a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:cisco:identity_services_engine:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco identity services engine 2.6.0 -
    cisco identity services engine 2.6.0 patch1
    cisco identity services engine 2.6.0 patch10
    cisco identity services engine 2.6.0 patch2
    cisco identity services engine 2.6.0 patch3
    cisco identity services engine 2.6.0 patch5
    cisco identity services engine 2.6.0 patch6
    cisco identity services engine 2.6.0 patch7
    cisco identity services engine 2.6.0 patch8
    cisco identity services engine 2.6.0 patch9
    cisco identity services engine 2.7.0 -
    cisco identity services engine 2.7.0 patch1
    cisco identity services engine 2.7.0 patch2
    cisco identity services engine 2.7.0 patch3
    cisco identity services engine 2.7.0 patch4
    cisco identity services engine 2.7.0 patch5
    cisco identity services engine 2.7.0 patch6
    cisco identity services engine 3.0.0 -
    cisco identity services engine 3.0.0 patch1
    cisco identity services engine 3.0.0 patch2
    cisco identity services engine 3.0.0 patch3
    cisco identity services engine 3.0.0 patch4
    cisco identity services engine 3.1 -
    cisco identity services engine -