{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-20417","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2023-11-08T15:08:07.663Z","datePublished":"2024-08-21T19:16:43.196Z","dateUpdated":"2024-08-27T13:43:25.274Z"},"containers":{"cna":{"title":"Cisco Identity Services Engine REST API Blind SQL Injection Vulnerabities","metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}}],"descriptions":[{"lang":"en","value":"Multiple vulnerabilities in the REST API of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct blind SQL injection attacks.\r\n\r\nThese vulnerabilities are due to insufficient validation of user-supplied input in REST API calls. An attacker could exploit these vulnerabilities by sending crafted input to an affected device. A successful exploit could allow the attacker to view or modify data on the affected device."}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rest-5bPKrNtZ","name":"cisco-sa-ise-rest-5bPKrNtZ"}],"exploits":[{"lang":"en","value":"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."}],"source":{"advisory":"cisco-sa-ise-rest-5bPKrNtZ","discovery":"EXTERNAL","defects":["CSCwj94294"]},"problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"cwe","cweId":"CWE-89"}]}],"affected":[{"vendor":"Cisco","product":"Cisco Identity Services Engine Software","versions":[{"version":"2.7.0","status":"affected"},{"version":"2.7.0 p1","status":"affected"},{"version":"2.7.0 p2","status":"affected"},{"version":"3.0.0","status":"affected"},{"version":"3.0.0 p1","status":"affected"},{"version":"2.7.0 p3","status":"affected"},{"version":"3.0.0 p2","status":"affected"},{"version":"2.7.0 p4","status":"affected"},{"version":"3.0.0 p3","status":"affected"},{"version":"3.1.0","status":"affected"},{"version":"2.7.0 p5","status":"affected"},{"version":"3.0.0 p4","status":"affected"},{"version":"2.7.0 p6","status":"affected"},{"version":"3.1.0 p1","status":"affected"},{"version":"3.0.0 p5","status":"affected"},{"version":"2.7.0 p7","status":"affected"},{"version":"3.1.0 p3","status":"affected"},{"version":"3.1.0 p2","status":"affected"},{"version":"3.0.0 p6","status":"affected"},{"version":"3.2.0","status":"affected"},{"version":"3.1.0 p4","status":"affected"},{"version":"2.7.0 p8","status":"affected"},{"version":"3.1.0 p5","status":"affected"},{"version":"3.2.0 p1","status":"affected"},{"version":"2.7.0 p9","status":"affected"},{"version":"3.0.0 p7","status":"affected"},{"version":"3.1.0 p6","status":"affected"},{"version":"3.2.0 p2","status":"affected"},{"version":"3.1.0 p7","status":"affected"},{"version":"3.3.0","status":"affected"},{"version":"3.2.0 p3","status":"affected"},{"version":"3.0.0 p8","status":"affected"},{"version":"2.7.0 p10","status":"affected"},{"version":"3.2.0 p4","status":"affected"},{"version":"3.1.0 p8","status":"affected"},{"version":"3.2.0 p5","status":"affected"},{"version":"3.2.0 p6","status":"affected"},{"version":"3.1.0 p9","status":"affected"},{"version":"3.3 Patch 2","status":"affected"},{"version":"3.3 Patch 1","status":"affected"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2024-08-21T19:16:43.196Z"}},"adp":[{"affected":[{"vendor":"cisco","product":"identity_services_engine_software","cpes":["cpe:2.3:a:cisco:identity_services_engine_software:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"3.0_p8","versionType":"custom"},{"version":"3.1","status":"affected","lessThan":"3.1_p10","versionType":"custom"},{"version":"3.2","status":"affected","lessThan":"3.2_p7","versionType":"custom"},{"version":"3.3","status":"affected","lessThan":"3.3_p4","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-27T13:16:44.679863Z","id":"CVE-2024-20417","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-27T13:43:25.274Z"}}]}}