8.1
CVSSv3

CVE-2021-1594

Published: 06/10/2021 Updated: 07/11/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the REST API of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote malicious user to perform a command injection attack and elevate privileges to root. This vulnerability is due to insufficient input validation for specific API endpoints. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting and modifying specific internode communications from one ISE persona to another ISE persona. A successful exploit could allow the malicious user to run arbitrary commands with root privileges on the underlying operating system. To exploit this vulnerability, the attacker would need to decrypt HTTPS traffic between two ISE personas that are located on separate nodes.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco identity services engine 2.4\\(0.902\\)

cisco identity services engine 2.6\\(0.156\\)

cisco identity services engine 2.6.0

cisco identity services engine 2.7.0

cisco identity services engine 3.0.0

cisco identity services engine

cisco identity services engine 2.7\\(0.903\\)

cisco identity services engine 3.0\\(0.458\\)

cisco identity services engine 3.1\\(0.440\\)

Vendor Advisories

A vulnerability in the REST API of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform a command injection attack and elevate privileges to root This vulnerability is due to insufficient input validation for specific API endpoints An attacker in a man-in-the-middle position could exploit this vulnerabil ...