First published: Wed Jan 13 2021(Updated: )
A vulnerability in the web-based management interface of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to improper input validation of log file content stored on the affected device. An attacker could exploit this vulnerability by modifying a log file with malicious code and getting a user to view the modified log file. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Enterprise NFV Infrastructure Software | <4.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1127 is a vulnerability in the web-based management interface of Cisco Enterprise NFV Infrastructure Software (NFVIS) that allows an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack.
CVE-2021-1127 has a severity rating of 5.4, which is considered medium.
Cisco Enterprise NFV Infrastructure Software version 4.4.1 and prior are affected by CVE-2021-1127.
An authenticated, remote attacker can exploit CVE-2021-1127 by conducting a cross-site scripting (XSS) attack against a user of the web-based management interface.
Yes, Cisco has provided a fix for CVE-2021-1127. Please refer to the official Cisco Security Advisory for more information.