First published: Fri Oct 05 2018(Updated: )
A vulnerability in the web-based management interface of Cisco Packaged Contact Center Enterprise could allow an unauthenticated, remote attacker to conduct a stored XSS attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a customized link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Packaged Contact Center Enterprise | =11.6\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Packaged Contact Center Enterprise vulnerability is CVE-2018-0444.
The severity level of CVE-2018-0444 is medium.
The CWE ID for this vulnerability is CWE-79 and CWE-352.
An unauthenticated attacker can exploit this vulnerability by conducting a stored XSS attack against a user of the interface.
Yes, Cisco has released a security advisory with details on how to fix this vulnerability. Please refer to the Cisco Security Advisory for more information.