{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T16:18:09.028","vulnerabilities":[{"cve":{"id":"CVE-2024-20476","sourceIdentifier":"psirt@cisco.com","published":"2024-11-06T17:15:15.337","lastModified":"2025-04-04T17:19:47.780","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to bypass the authorization mechanisms for specific file management functions.\r\n\r\nThis vulnerability is due to lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to upload files to a location that should be restricted. To exploit this vulnerability, an attacker would need valid Read-Only Administrator&nbsp;credentials."},{"lang":"es","value":"Una vulnerabilidad en la interfaz de administración basada en web de Cisco ISE podría permitir que un atacante remoto autenticado eluda los mecanismos de autorización para funciones específicas de administración de archivos. Esta vulnerabilidad se debe a la falta de validación del lado del servidor de los permisos de administrador. Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada a un sistema afectado. Una explotación exitosa podría permitir al atacante cargar archivos a una ubicación que debería estar restringida. Para aprovechar esta vulnerabilidad, un atacante necesitaría credenciales de administrador de solo lectura válidas."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-602"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*","versionEndExcluding":"3.1","matchCriteriaId":"742B3761-9FD6-4E67-BDDD-D4DD2C3111D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*","matchCriteriaId":"7A789B44-7E6C-4FE9-BD40-702A871AB8AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*","matchCriteriaId":"93920663-445E-4456-A905-81CEC6CA1833"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*","matchCriteriaId":"33DA5BB8-4CFE-44BD-9CEB-BC26577E8477"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*","matchCriteriaId":"D3AEFA85-66B5-4145-A4AD-96D1FF86B46D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*","matchCriteriaId":"7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*","matchCriteriaId":"E939B65A-7912-4C36-8799-03A1526D7BD3"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*","matchCriteriaId":"833B438F-0869-4C0D-9952-750C00702E8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*","matchCriteriaId":"E8B2588D-01F9-450B-B2E3-ADC4125E354E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*","matchCriteriaId":"E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*","matchCriteriaId":"654E946A-07C5-4036-BC54-85EF42B808DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*","matchCriteriaId":"7932D5D5-83E1-4BEF-845A-D0783D4BB750"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*","matchCriteriaId":"1B818846-4A6E-4256-B344-281E8C786C43"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*","matchCriteriaId":"A44858A2-922A-425A-8B38-0C47DB911A3C"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*","matchCriteriaId":"53484A32-757B-42F8-B655-554C34222060"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*","matchCriteriaId":"0CCAC61F-C273-49B3-A631-31D3AE3EB148"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*","matchCriteriaId":"51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*","matchCriteriaId":"B452B4F0-8510-475E-9AE8-B48FABB4D7D3"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*","matchCriteriaId":"F1B9C2C1-59A4-49A0-9B74-83CCB063E55D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*","matchCriteriaId":"DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*","matchCriteriaId":"E6C94CC4-CC08-4DAF-A606-FDAFC92720A9"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*","matchCriteriaId":"BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vulns-AF544ED5","source":"psirt@cisco.com","tags":["Vendor Advisory"]}]}}]}