{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T13:15:32.261","vulnerabilities":[{"cve":{"id":"CVE-2023-20272","sourceIdentifier":"psirt@cisco.com","published":"2023-11-21T19:15:08.920","lastModified":"2024-11-21T07:41:02.977","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to upload malicious files to the web root of the application. This vulnerability is due to insufficient file input validation. An attacker could exploit this vulnerability by uploading a malicious file to the web interface. A successful exploit could allow the attacker to replace files and gain access to sensitive server-side information."},{"lang":"es","value":"Una vulnerabilidad en la interfaz de administración basada en web de Cisco Identity Services Engine podría permitir que un atacante remoto autenticado cargue archivos maliciosos en la raíz web de la aplicación. Esta vulnerabilidad se debe a una validación de entrada de archivos insuficiente. Un atacante podría aprovechar esta vulnerabilidad cargando un archivo malicioso en la interfaz web. Un exploit exitoso podría permitir al atacante reemplazar archivos y obtener acceso a información confidencial del lado del servidor."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":1.2,"impactScore":5.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-424"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*","matchCriteriaId":"A1063044-BCD7-487F-9880-141C30547E36"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*","matchCriteriaId":"DA42E65A-7207-48B8-BE1B-0B352201BC09"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*","matchCriteriaId":"75DDAF38-4D5F-4EE4-A428-68D28FC0DA96"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*","matchCriteriaId":"C5FB6AA6-F8C9-48A6-BDDA-1D25C43564EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*","matchCriteriaId":"2B3A267A-5FEA-426D-903E-BD3F4F94A1A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*","matchCriteriaId":"B1B3207B-1B9C-41AA-8EF6-8478458462E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*","matchCriteriaId":"C5B9E7F3-B0F2-4A6A-B939-A62E9B12CCEB"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch7:*:*:*:*:*:*","matchCriteriaId":"EF4C5A58-D0AE-48D6-9757-18C1D5BE5070"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*","matchCriteriaId":"C4DB9726-532F-45CE-81FD-45F2F6C7CE51"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*","matchCriteriaId":"2E8F0066-0EC0-41FD-80BE-55C4ED5F6B0E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1:patch2:*:*:*:*:*:*","matchCriteriaId":"A1E81F86-7ED6-4D6C-8DAF-09EB2A7BC496"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*","matchCriteriaId":"5D1765DB-1BEF-4CE9-8B86-B91F709600EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1:patch4:*:*:*:*:*:*","matchCriteriaId":"3D1E80EF-C3FD-4F7A-B63D-0EAA5C878B11"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-mult-j-KxpNynR","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-mult-j-KxpNynR","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}