| Summary | A vulnerability in the API of Cisco ISE could allow an authenticated, remote attacker to read and delete arbitrary files on an affected device. To exploit this vulnerability, the attacker would need valid Super Admin credentials. This vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read or delete arbitrary files on the underlying operating system. |
|---|---|
| Publication Date | Nov. 7, 2024, 2:15 a.m. |
| Registration Date | Nov. 7, 2024, 5 a.m. |
| Last Update | Nov. 7, 2024, 3:17 a.m. |
| Title | シスコシステムズの Cisco Identity Services Engine (ISE) におけるパストラバーサルの脆弱性 |
|---|---|
| Summary | シスコシステムズの Cisco Identity Services Engine (ISE) には、パストラバーサルの脆弱性が存在します。 |
| Possible impacts | 情報を取得される、および情報を改ざんされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Nov. 6, 2024, midnight |
| Registration Date | April 30, 2025, 11:39 a.m. |
| Last Update | April 30, 2025, 11:39 a.m. |
| シスコシステムズ |
| Cisco Identity Services Engine (ISE) 3.0.0 以上 3.1.0 未満 |
| Cisco Identity Services Engine (ISE) 3.1.0 |
| Cisco Identity Services Engine (ISE) 3.2.0 |
| Cisco Identity Services Engine (ISE) 3.3.0 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2025年04月30日] 掲載 | April 30, 2025, 11:38 a.m. |