CVE-2020-3467 - Incorrect Authorization

Severity

77%

Complexity

31%

Confidentiality

66%

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to modify parts of the configuration on an affected device. The vulnerability is due to improper enforcement of role-based access control (RBAC) within the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to modify parts of the configuration. The modified configuration could either allow unauthorized devices onto the network or prevent authorized devices from accessing the network. To exploit this vulnerability, an attacker would need valid Read-Only Administrator credentials.

CVSS 3.1 Base Score 7.7. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).

CVSS 2.0 Base Score 5.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:P).

Demo Examples

Incorrect Authorization

CWE-863

The following code could be for a medical records application. It displays a record to already authenticated users, confirming the user's authorization using a value stored in a cookie.


               
}
}
setcookie("role", $role, time()+60*60*2);
die("\n");
DisplayMedicalHistory($_POST['patient_ID']);
die("You are not Authorized to view this record\n");

The programmer expects that the cookie will only be set when getRole() succeeds. The programmer even diligently specifies a 2-hour expiration for the cookie. However, the attacker can easily set the "role" cookie to the value "Reader". As a result, the $role variable is "Reader", and getRole() is never invoked. The attacker has bypassed the authorization system.

Overview

Type

Cisco Identity Services Engine

First reported 4 years ago

2020-10-08 05:15:00

Last updated 4 years ago

2020-10-16 16:16:00

Affected Software

Cisco Identity Services Engine (ISE)

Cisco Identity Services Engine 2.4(0.357)

2.4\(0.357\)

Cisco Identity Services Engine (ISE) 2.4.0.357 Patch 1

2.4.0.357

Cisco Identity Services Engine (ISE) 2.4.0.357 Patch 10

2.4.0.357

Cisco Identity Services Engine (ISE) 2.4.0.357 Patch 2

2.4.0.357

Cisco Identity Services Engine (ISE) 2.4.0.357 Patch 3

2.4.0.357

Cisco Identity Services Engine (ISE) 2.4.0.357 Patch 4

2.4.0.357

Cisco Identity Services Engine (ISE) 2.4.0.357 Patch 5

2.4.0.357

Cisco Identity Services Engine (ISE) 2.4.0.357 Patch 6

2.4.0.357

Cisco Identity Services Engine (ISE) 2.4.0.357 Patch 7

2.4.0.357

Cisco Identity Services Engine (ISE) 2.4.0.357 Patch 8

2.4.0.357

Cisco Identity Services Engine (ISE) 2.4.0.357 Patch 9

2.4.0.357

Cisco Identity Services Engine (ISE) 2.5

2.5

Cisco Identity Services Engine 2.6(0.156)

2.6\(0.156\)

Cisco Identity Services Engine 2.6.0

2.6.0

Cisco Identity Services Engine (ISE) 2.7

2.7

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.