We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability in the Admin portal of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to recover service account passwords that are saved on an affected system. The vulnerability is due to the incorrect inclusion of saved passwords when loading configuration pages in the Admin portal. An attacker with read or write access to the Admin portal could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to recover passwords and expose those accounts to further attack.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Reserved 2019-12-12 | Published 2024-11-18 | Updated 2024-11-18 | Assigner ciscoExposure of Sensitive Information to an Unauthorized Actor
sec.cloudapps.cisco.com/...o-sa-ise-pass-disclosure-K8p2Nsgg (cisco-sa-ise-pass-disclosure-K8p2Nsgg)
sec.cloudapps.cisco.com/...ory/cisco-sa-esa-tls-dos-xW53TBhb
sec.cloudapps.cisco.com/...cisco-sa-dcnm-authbypass-YVJzqgk2
sec.cloudapps.cisco.com/...ry/cisco-sa-dcnm-pa-trav-bMdfSTTq
sec.cloudapps.cisco.com/...isco-sa-cucm-cuc-imp-xss-XtpzfM5e
Support options