First published: Thu Oct 19 2017(Updated: )
A vulnerability in the web framework code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of the affected software. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected software. An attacker could exploit this vulnerability by convincing a user of the web interface to access a malicious link or by intercepting a user request for the affected web interface and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvb09516.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =16.1.2 | |
Cisco IOS XE Web UI | =16.2.0 | |
Cisco IOS XE Web UI | =16.3\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12272 has been classified as a medium severity vulnerability due to its potential to allow cross-site scripting attacks.
To mitigate CVE-2017-12272, upgrade affected Cisco IOS XE software to the latest version that addresses the vulnerability.
CVE-2017-12272 affects users of Cisco IOS XE versions 16.1.2, 16.2.0, and 16.3(1) using the web interface.
CVE-2017-12272 enables unauthenticated remote attackers to conduct cross-site scripting (XSS) attacks against users.
Exploitation of CVE-2017-12272 can result in unauthorized actions being performed in the context of a victim's session.