Vulnerability Details : CVE-2018-15424
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device with the privileges of the web server.
Vulnerability category: Input validation
Products affected by CVE-2018-15424
- cpe:2.3:a:cisco:identity_services_engine:2.2\(0.470\):*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-15424
0.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 42 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-15424
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
4.7
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L |
1.2
|
3.4
|
NIST |
CWE ids for CVE-2018-15424
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: ykramarz@cisco.com (Secondary)
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-15424
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ise-mult-vulns
Multiple Vulnerabilities in Cisco Identity Services EngineVendor Advisory
-
http://www.securitytracker.com/id/1041792
Cisco Identity Services Engine File Upload and Java Deserialization Bugs Let Remote Authenticated Users Execute Arbitrary Code on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
Jump to