First published: Wed Jan 20 2021(Updated: )
A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Web Security Virtual Appliance | <12.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1271 is classified as a moderate severity vulnerability.
To fix CVE-2021-1271, upgrade to Cisco Web Security Appliance version 12.5.1 or later.
CVE-2021-1271 affects users of the web-based management interface of Cisco AsyncOS for Cisco Web Security Appliances up to version 12.5.1.
CVE-2021-1271 can enable an authenticated remote attacker to perform a stored cross-site scripting (XSS) attack.
Yes, successful exploitation of CVE-2021-1271 requires the attacker to be authenticated.