First published: Wed Nov 18 2020(Updated: )
Multiple vulnerabilities in the web UI of Cisco IoT Field Network Director (FND) could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against users on an affected system. The vulnerabilities are due to insufficient validation of user-supplied input that is processed by the web UI. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information on an affected system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IoT Field Network Director | <4.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26081 has been classified as a high severity vulnerability due to its potential for cross-site scripting attacks.
To address CVE-2020-26081, update the Cisco IoT Field Network Director to version 4.6.1 or later.
CVE-2020-26081 can enable unauthenticated remote attackers to conduct cross-site scripting (XSS) attacks.
CVE-2020-26081 affects all versions of Cisco IoT Field Network Director prior to 4.6.1.
Yes, CVE-2020-26081 can be exploited by an unauthenticated attacker.