A vulnerability in the Identity Services Engine (ISE) integration feature of Cisco Prime Infrastructure (PI) could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack against the Secure Sockets Layer (SSL) tunnel established between ISE and PI. The vulnerability is due to improper validation of the server SSL certificate when establishing the SSL tunnel with ISE. An attacker could exploit this vulnerability by using a crafted SSL certificate and could then intercept communications between the ISE and PI. A successful exploit could allow the attacker to view and alter potentially sensitive information that the ISE maintains about clients that are connected to the network. This vulnerability affects Cisco Prime Infrastructure Software Releases 2.2 through 3.4.0 when the PI server is integrated with ISE, which is disabled by default.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107092 | Third Party Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-prime-validation | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2019-02-20T00:00:00
Updated: 2019-02-22T10:57:01
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1659
JSON object: View
NVD Information
Status : Modified
Published: 2019-02-21T15:29:00.237
Modified: 2019-10-09T23:47:38.800
Link: CVE-2019-1659
JSON object: View
Redhat Information
No data.
CWE