First published: Wed Jan 13 2021(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Firepower Management Center | <6.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1239.
The severity rating of CVE-2021-1239 is medium with a CVSS v3 base score of 4.8.
The affected software is the web-based management interface of Cisco Firepower Management Center (FMC) version 6.7.0 and earlier.
An authenticated, remote attacker can exploit CVE-2021-1239 by conducting a stored cross-site scripting (XSS) attack against a user of the interface of an affected system.
Yes, Cisco has released a security advisory with remediation steps for CVE-2021-1239. Please refer to the Cisco Security Advisory for more information.