Cisco Identity Services Engine Authentication Bypass (cisco-sa-ISE-SAML-nuukMPf9)

critical Nessus Plugin ID 162482


The remote device is missing a vendor-supplied security patch.


A vulnerability in the login page of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to log in without credentials and access all roles without any restrictions. This vulnerability is due to exposed sensitive Security Assertion Markup Language (SAML) metadata. An attacker could exploit this vulnerability by using the exposed SAML metadata to bypass authentication to the user portal. A successful exploit could allow the attacker to access all roles without any restrictions.

Please see the included Cisco BID and Cisco Security Advisory for more information.


Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvz67073

See Also

Plugin Details

Severity: Critical

ID: 162482

File Name: cisco-sa-ISE-SAML-nuukMPf9.nasl

Version: 1.5

Type: local

Family: CISCO

Published: 6/22/2022

Updated: 10/25/2022

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2022-20733


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:cisco:identity_services_engine, cpe:/a:cisco:identity_services_engine, cpe:/a:cisco:identity_services_engine_software

Required KB Items: Host/Cisco/ISE/version

Exploit Ease: No known exploits are available

Patch Publication Date: 6/15/2022

Vulnerability Publication Date: 6/15/2022

Reference Information

CVE: CVE-2022-20733

CISCO-SA: cisco-sa-ISE-SAML-nuukMPf9

IAVA: 2022-A-0252-S