First published: Thu Sep 07 2017(Updated: )
A vulnerability in the web framework of Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of certain parameters that are passed to the affected software via the HTTP GET and HTTP POST methods. An attacker who can convince a user to follow an attacker-supplied link could execute arbitrary script or HTML code in the user's browser in the context of an affected site. Known Affected Releases 10.5(2). Cisco Bug IDs: CSCvf25345.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unity Connection | =10.5\(2\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12212 has a medium severity level due to its potential for reflected cross-site scripting attacks.
To fix CVE-2017-12212, update the Cisco Unity Connection to the latest version that addresses this vulnerability.
Users of Cisco Unity Connection version 10.5(2) are affected by CVE-2017-12212.
CVE-2017-12212 allows an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack.
CVE-2017-12212 is caused by insufficient input validation in the web framework of Cisco Unity Connection.