This vulnerability is due to a lack of proper data protection mechanisms for certain configuration settings. An attacker with Read-Only Administrator privileges could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to view device credentials that are normally not visible to Read-Only Administrators.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-18230 | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device. This vulnerability is due to a lack of proper data protection mechanisms for certain configuration settings. An attacker with Read-Only Administrator privileges could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to view device credentials that are normally not visible to Read-Only Administrators. |
Tue, 05 Aug 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:cisco:identity_services_engine:3.0.0:p1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:p1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:p2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:p3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:p4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:p5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:p6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:p1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:p2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:p3:*:*:*:*:*:* |
cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:* |
Tue, 08 Oct 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco identity Services Engine |
|
| CPEs | cpe:2.3:a:cisco:identity_services_engine:2.7.0:p8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.0.0:p8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:p8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:p1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:p2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:p3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:p4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:p5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:p6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:p1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:p2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:p3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:* |
|
| Vendors & Products |
Cisco
Cisco identity Services Engine |
Wed, 02 Oct 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 02 Oct 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device. This vulnerability is due to a lack of proper data protection mechanisms for certain configuration settings. An attacker with Read-Only Administrator privileges could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to view device credentials that are normally not visible to Read-Only Administrators. | |
| Title | Cisco Identity Services Engine Information Disclosure Vulnerability | |
| Weaknesses | CWE-311 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-10-02T17:26:00.279Z
Reserved: 2023-11-08T15:08:07.689Z
Link: CVE-2024-20515
Updated: 2024-10-02T17:17:52.913Z
Status : Analyzed
Published: 2024-10-02T17:15:17.973
Modified: 2025-08-05T14:48:36.833
Link: CVE-2024-20515
No data.
OpenCVE Enrichment
No data.
EUVD