Vulnerability Details : CVE-2023-20111
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to access sensitive information.
This vulnerability is due to the improper storage of sensitive information within the web-based management interface. An attacker could exploit this vulnerability by logging in to the web-based management interface and viewing hidden fields within the application. A successful exploit could allow the attacker to access sensitive information, including device entry credentials, that could aid the attacker in further attacks.
Products affected by CVE-2023-20111
- cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.1:patch4:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.1:patch5:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.1:patch6:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch7:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch8:*:*:*:*:*:*
- cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch9:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-20111
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-20111
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
Cisco Systems, Inc. |
CWE ids for CVE-2023-20111
-
The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.Assigned by: ykramarz@cisco.com (Secondary)
References for CVE-2023-20111
-
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-credentials-tkTO3h3
Cisco Identity Services Engine Device Credential Information Disclosure VulnerabilityVendor Advisory
Jump to