First published: Wed Sep 23 2020(Updated: )
A vulnerability in the web framework of Cisco Emergency Responder could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of some parameters that are passed to the web server of the affected software. An attacker could exploit this vulnerability by persuading a user to access a malicious link or by intercepting a user request for the affected web interface and injecting malicious code into that request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web-based management interface or access sensitive, browser-based information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Emergency Responder | <=12.5_su1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-16025.
The severity of CVE-2019-16025 is medium with a CVSS score of 4.8.
CVE-2019-16025 affects Cisco Emergency Responder version 12.5_su1.
The impact of CVE-2019-16025 is that an authenticated remote attacker can conduct a cross-site scripting (XSS) attack against a user of the web-based management interface.
To fix CVE-2019-16025, Cisco Emergency Responder users should apply the necessary updates or patches provided by Cisco.