Vulnslist

find the latest Cisco vulnerabilities

Cisco Identity Services Engine Privilege Escalation Vulnerability

cisco-sa-ise-priv-esc-fNZX8hHj · Medium · Published · Updated

A vulnerability in the Microsoft Active Directory integration of Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker would need to have a valid administrator account on an affected device. The vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to the system with a crafted Active Directory account. A successful exploit could allow the attacker to obtain root privileges on an affected device. Note: Only devices that have the CLI configured to support Active Directory authentication are affected by this vulnerability. CLI support for Active Directory authentication is disabled by default. All other uses of Active Directory Domain Services or Active Directory Certificate Services within ISE are not affected. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-priv-esc-fNZX8hHj

Workarounds

There are no workarounds that address this vulnerability.

However, administrators can disable the Active Directory CLI capability as a mitigation.

Note: A user with administrator access to the CLI will be able to re-enable it.

CVEsCVE-2020-27122
Cisco Bug IDsCSCvv08885
CVSS ScoreBase 4.4
Base 4.4 CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco Identity Services Engine Software

Related Products

Product CVE Evidence
Cisco Identity Services Engine Software CVE-2020-27122 Cisco OpenVuln