6.8
CVSSv2

CVE-2015-6317

Published: 23/01/2016 Updated: 07/12/2016
CVSS v2 Base Score: 6.8 | Impact Score: 6.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:L/Au:S/C:N/I:C/A:N

Vulnerability Summary

Cisco Identity Services Engine (ISE) prior to 2.0 allows remote authenticated users to bypass intended web-resource access restrictions via a direct request, aka Bug ID CSCuu45926.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco identity services engine software 1.3\\(120.135\\)

cisco identity services engine software 1.3\\(106.146\\)

cisco identity services engine software 1.2.1

cisco identity services engine software 1.1.4

cisco identity services engine software 1.1.3

cisco identity services engine software 1.1.2

cisco identity services engine software 1.1.1

cisco identity services engine software 1.0.4.573

cisco identity services engine software 1.0_mr_base

cisco identity services engine software 1.2\\(1.198\\)

cisco identity services engine software 1.4\\(0.109\\)

cisco identity services engine software 1.2\\(0.793\\)

cisco identity services engine software 1.2.0.899

cisco identity services engine software 1.2\\(0.747\\)

cisco identity services engine software 1.2_base

cisco identity services engine software 1.1_base

cisco identity services engine software 1.3\\(0.722\\)

cisco identity services engine software 1.2\\(1.901\\)

cisco identity services engine software 1.0_base

cisco identity services engine software 1.4\\(0.253\\)

cisco identity services engine software 1.4\\(0.181\\)

cisco identity services engine software 1.3\\(0.876\\)

Vendor Advisories

Cisco Identity Services Engine versions prior to 20 contain a vulnerability that could allow a low-privileged authenticated, remote attacker to access specific web resources that are designed to be accessed only by higher-privileged administrative users The vulnerability occurs because specific types of web resources are not correctly filtered f ...

Recent Articles

Cisco admins gear up for a late night – hardcoded password in wireless points nuked
The Register • Richard Chirgwin • 13 Jan 2016

Wi-Fi gear, WLAN controllers, ISE get security patches

Cisco sysadmins have a busy day ahead of them, with vulnerabilities announced in wireless LAN controllers, the Cisco Identity Services Engine, and Aironet access points. The Aironet 1800 series flaw, CVE-2015-6336, is that old favorite: a hardcoded static password granting access to the device. Luckily, the account with the hardwired credential doesn't have admin privilege, so Cisco reckons its exposure is limited to denial-of-service attacks. The access points that need updating are the 1830e, ...