Cisco has published a heads-up for admins of Cisco Identity Services Engine solutions, about two vulnerabilities that could be exploited to read and delete files on an affected device, and to execute arbitrary script or access sensitive information.
Cisco Identity Services is a policy management and access control platform for devices on networks and is a crucial element of an organization’s zero-trust architecture.
CVE-2022-20822 is a path traversal vulnerability in the web-based management interface of Cisco ISE that could be exploited by an authenticated, remote attacker.
“An attacker could exploit this vulnerability by sending a crafted HTTP request that contains certain character sequences to an affected system. A successful exploit could allow the attacker to read or delete specific files on the device that their configured administrative level should not have access to,” Cisco says.
CVE-2022-20959 is a cross-site scripting vulnerability in Cisco ISE’s External RESTful Services API. “An attacker could exploit this vulnerability by persuading an authenticated administrator of the web-based management interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.”
There are hot patches available on request, and Cisco is offering them to interested parties after they get in touch with Cisco’s Technical Assistance Center.