Vulnslist

find the latest Cisco vulnerabilities

Cisco Identity Services Engine Cross-Site Scripting Vulnerability

cisco-sa-ise-xss-twLnpy3M · Medium · Published · Updated

A vulnerability in the External RESTful Services (ERS) API of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by persuading an authenticated administrator of the web-based management interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-twLnpy3M

Workarounds

There are no workarounds that address this vulnerability. However, administrators may disable the affected feature.

To disable ERS in Cisco ISE releases 2.0 to 2.7, do the following:

Log in to the Cisco ISE web management interface.
Choose Administration > System > Settings.
Choose ERS Settings.
Click the Disable ERS radio button.

To disable ERS in Cisco ISE Release 3.0, do the following:

Log in to the Cisco ISE web management interface.
Click the menu icon.
Choose Administration > System > Settings.
Click the Disable ERS radio button.

To disable ERS in Cisco ISE releases 3.1 and 3.2, do the following:

Log in to the Cisco ISE web management interface.
Click the menu icon.
Choose Administration > System > Settings.
Choose API Settings.
Choose the API Service Settings tab.
Click the ERS (Read/Write) toggle switch to deactivate it.

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2022-20959
Cisco Bug IDsCSCwc62413
CVSS ScoreBase 6.1
Base 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco Identity Services Engine Software

CSAF Product Statuses

Product Status Source CVE Rows
Cisco Identity Services Engine Software known_affected cisco_csaf CVE-2022-20959 1

Related Products

Product CVE Evidence
Cisco Identity Services Engine Software CVE-2022-20959 Cisco OpenVuln