First published: Thu Jan 26 2017(Updated: )
A cross-site scripting (XSS) filter bypass vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to mount XSS attacks against a user of an affected device. More Information: CSCvb97237. Known Affected Releases: 11.0(1.10000.10) 11.5(1.10000.6). Known Fixed Releases: 11.5(1.12029.1) 11.5(1.12900.11) 12.0(0.98000.369) 12.0(0.98000.370) 12.0(0.98000.398) 12.0(0.98000.457).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager | =11.5\(1.12000.1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3798 has been classified as a medium severity vulnerability.
To fix CVE-2017-3798, it is recommended to apply the latest patches and updates provided by Cisco for Unified Communications Manager.
CVE-2017-3798 facilitates cross-site scripting (XSS) attacks against users of affected devices.
Unauthenticated, remote attackers can exploit CVE-2017-3798 against users of affected Cisco Unified Communications Manager devices.
Cisco Unified Communications Manager version 11.5(1.12000.1) is among the affected releases for CVE-2017-3798.