CVE-2024-20515

6.5 MEDIUM

📋 TL;DR

An authenticated attacker with Read-Only Administrator privileges in Cisco Identity Services Engine (ISE) can exploit improper data protection mechanisms to view sensitive device credentials that should be hidden. This affects organizations using vulnerable versions of Cisco ISE for network access control and policy management.

💻 Affected Systems

Products:
  • Cisco Identity Services Engine (ISE)
Versions: Multiple versions prior to 3.3 Patch 2
Operating Systems: Cisco ISE appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Read-Only Administrator privileges to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative credentials, potentially leading to full system compromise, lateral movement, and data exfiltration.

🟠

Likely Case

Attackers gain access to sensitive configuration data that could facilitate further attacks or reconnaissance.

🟢

If Mitigated

Limited exposure with proper access controls and monitoring in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with Read-Only Administrator privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Cisco ISE 3.3 Patch 2 and later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disc-ZYF2nEEX

Restart Required: Yes

Instructions:

1. Download the patch from Cisco Software Center. 2. Apply the patch following Cisco ISE patch installation procedures. 3. Restart the ISE services or appliance as required.

🔧 Temporary Workarounds

Restrict Read-Only Administrator Access

all

Limit Read-Only Administrator accounts to only trusted personnel and monitor their activities.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all Read-Only Administrator account activities.
  • Segment network access to ISE management interface and implement network-based restrictions.

🔍 How to Verify

Check if Vulnerable:

Check Cisco ISE version via web interface or CLI. Vulnerable if version is prior to 3.3 Patch 2.

Check Version:

show version

Verify Fix Applied:

Verify the installed version is 3.3 Patch 2 or later and test that Read-Only Administrators cannot access sensitive credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns by Read-Only Administrator accounts to sensitive configuration pages.

Network Indicators:

  • Multiple requests to specific ISE management interface pages containing sensitive data.

SIEM Query:

source="ISE" AND (event_type="CONFIGURATION_ACCESS" OR user_role="READ_ONLY_ADMIN") AND url_contains="sensitive"

🔗 References

📤 Share & Export