First published: Sat May 22 2021(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Finesse could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit these vulnerabilities by injecting malicious code into the web-based management interface and persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. An attacker needs valid administrator credentials to inject the malicious script code.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Finesse | <12.6\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1254.
The severity rating of CVE-2021-1254 is medium (4.8).
An attacker can exploit CVE-2021-1254 by conducting a cross-site scripting (XSS) attack against a user of the Cisco Finesse web-based management interface.
The affected software version of Cisco Finesse for CVE-2021-1254 is up to 12.6(1).
Yes, Cisco has released a security advisory with fixes and workarounds for CVE-2021-1254. Please refer to the Cisco Security Advisory for more information.