You are here
Home > Preporuke > Ranjivost Cisco ISE uređaja

Ranjivost Cisco ISE uređaja

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Identity Services Engine Authentication Bypass Vulnerability

Advisory ID: cisco-sa-20170802-ise

Revision: 1.0

For Public Release: 2017 August 2 16:00 GMT

Last Updated: 2017 August 2 16:00 GMT

CVE ID(s): CVE-2017-6747

CVSS Score v(3): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary
=======
A vulnerability in the authentication module of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to bypass local authentication.

The vulnerability is due to improper handling of authentication requests and policy assignment for externally authenticated users. An attacker could exploit this vulnerability by authenticating with a valid external user account that matches an internal username and incorrectly receiving the authorization policy of the internal account. An exploit could allow the attacker to have Super Admin privileges for the ISE Admin portal.

This vulnerability does not affect endpoints authenticating to the ISE.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-ise [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-ise”]

—–BEGIN PGP SIGNATURE—–
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=sH0X
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-08-0017-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost Cisco VDS-TV uređaja

Otkrivena je ranjivost u poslužitelju priručne memorije unutar Cisco VDS-TV (Cisco Videoscape Distribution Suite for Television) uređaja. Ranjivost je uzrokovana...

Close