9.8
CVSSv3

CVE-2015-6323

Published: 15/01/2016 Updated: 07/12/2016
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Admin portal in Cisco Identity Services Engine (ISE) 1.1.x, 1.2.0 before patch 17, 1.2.1 before patch 8, 1.3 before patch 5, and 1.4 before patch 4 allows remote malicious users to obtain administrative access via unspecified vectors, aka Bug ID CSCuw34253.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco identity services engine software 1.1.4

cisco identity services engine software 1.1.3

cisco identity services engine software 1.1.2

cisco identity services engine software 1.1.1

cisco identity services engine software 1.3\\(106.146\\)

cisco identity services engine software 1.3\\(0.722\\)

cisco identity services engine software 1.2.1

cisco identity services engine software 1.2\\(0.793\\)

cisco identity services engine software 1.3\\(120.135\\)

cisco identity services engine software 1.2\\(0.747\\)

cisco identity services engine software 1.2\\(1.198\\)

cisco identity services engine software 1.4\\(0.109\\)

cisco identity services engine software 1.3\\(0.876\\)

cisco identity services engine software 1.2.0.899

cisco identity services engine software 1.2_base

cisco identity services engine software 1.1_base

cisco identity services engine software 1.4\\(0.253\\)

cisco identity services engine software 1.2\\(1.901\\)

cisco identity services engine software 1.4\\(0.181\\)

Vendor Advisories

A vulnerability in the Admin portal of devices running Cisco Identity Services Engine (ISE) software could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device An attacker who can connect to the Admin portal of an affected device could potentially exploit this vulnerability A successful exploit may result i ...

Recent Articles

Cisco admins gear up for a late night – hardcoded password in wireless points nuked
The Register • Richard Chirgwin • 13 Jan 2016

Wi-Fi gear, WLAN controllers, ISE get security patches

Cisco sysadmins have a busy day ahead of them, with vulnerabilities announced in wireless LAN controllers, the Cisco Identity Services Engine, and Aironet access points. The Aironet 1800 series flaw, CVE-2015-6336, is that old favorite: a hardcoded static password granting access to the device. Luckily, the account with the hardwired credential doesn't have admin privilege, so Cisco reckons its exposure is limited to denial-of-service attacks. The access points that need updating are the 1830e, ...