Check the status of CVEs. Learn More.
Keeping your systems up 100% of the time requires live patching. Our solutions will align strongly with your risk, compliance, and operational uptime requirements.
TuxCare is trusted by the most innovative companies across the globe.
Learn about TuxCare's modern approach to reducing cybersecurity risk with Blogs, White Papers, and more.
Continually increasing Cybersecurity, stability, and availability of Linux servers and open source software since 2009.
TuxCare provides live security patching for numerous industries. Learn how TuxCare is minimizing risk for companies around the world.
Follow Us on Social
Cisco has released security updates to address two vulnerabilities that are classified as “high”: CVE-2022-20961 and CVE-2022-20956.
The vulnerabilities affect the Cisco Identity Services Engine and could allow an attacker to conduct multiple malicious activities.
CVE-2022-20961 has a severity score of 8.8 and was caused by inadequate CSRF protection for the web-based management interface of an affected device.
A vulnerability in the web-based management interface of Cisco Identity Services Engine ISF could allow an unauthenticated, remote attacker to conduct a Cross-Site Request Forgery CSRF attack and perform arbitrary actions on an affected device.
A remote attacker can send a malformed HTTP request to perform arbitrary actions on the affected device by using the privileges of the target user after convincing him to visit a malicious website.
The vulnerability could allow an attacker to conduct cross-site scripting attacks, poisoning the webcache, and other malicious activities. The vulnerability affects the Identity Services Engine version prior to 3.2. However, Cisco stated that there is no evidence that the vulnerability has been exploited for malicious activities.
The second bug fixed, CVE-2022-20956, has a severity of 7.1 and is caused by improper access control in the web-based management interface.
The vulnerability is found in the web-based management interface of Cisco Identity Services Engine (ISE).
By sending a specifically crafted HTTP request, a threat actor could exploit the vulnerability to bypass authorization and access system files. The bug affects the Identity Services Engine version 3.1 and 3.2. Cisco confirmed that a proof-of-concept exploit code exists for the vulnerability.
Although there are no workarounds to the two vulnerabilities, the security updates released by Cisco ultimately fix the vulnerabilities. Users are recommended to download the latest updates to resolve the vulnerabilities.
The sources for this piece include an article SecurityOnline.
Check out this news in our Tuxcare Vblog
TALK TO A CYBERSECURITY EXPERT
Stay updated with the latest news and announcements from TuxCare.com
ESET researchers discovered an ongoing campaign by the Bahamut APT...
A memory leak bug on Local Security Authority Subsystem Service...
After discovering malicious behaviors in 1,652 of 250,000 unverified Linux...
Despite fixes released by the chipmaker, a set of five...
The APT group DefrayX has launched a new version of...
DuckDuckGo, a privacy-focused search engine, has added an App Tracking...