First published: Thu Sep 07 2017(Updated: )
A vulnerability in the Cisco Unified Intelligence Center web interface could allow an unauthenticated, remote attacker to impact the integrity of the system by executing a Document Object Model (DOM)-based, environment or client-side cross-site scripting (XSS) attack. The vulnerability occurs because user-supplied data in the DOM input is not validated. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious DOM statements to the affected system. A successful exploit could allow the attacker to affect the integrity of the system by manipulating the database. Known Affected Releases 11.0(1)ES10. Cisco Bug IDs: CSCvf18325.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Intelligence Center | =11.0\(1\)es10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6789 is classified as a high severity vulnerability due to its potential to allow unauthenticated remote attackers to execute client-side XSS attacks.
To fix CVE-2017-6789, users should upgrade their Cisco Unified Intelligence Center to a patched version that addresses the vulnerability.
CVE-2017-6789 affects Cisco Unified Intelligence Center version 11.0(1)es10.
CVE-2017-6789 allows for DOM-based, environment or client-side cross-site scripting (XSS) attacks.
Yes, CVE-2017-6789 can be exploited by unauthenticated remote attackers.