First published: Mon Nov 18 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.There are no workarounds that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager Session Management Edition | ||
Cisco Unified Communications Manager Session Management Edition |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3420 is rated as a medium severity vulnerability due to its potential impact on web-based management interfaces.
To mitigate CVE-2020-3420, apply the security patches released by Cisco for the affected products.
CVE-2020-3420 affects users of Cisco Unified Communications Manager and Cisco Unified Communications Manager Session Management Edition.
CVE-2020-3420 allows an authenticated attacker to conduct cross-site scripting (XSS) attacks.
Yes, CVE-2020-3420 can be exploited by an authenticated remote attacker.