First published: Wed Jun 16 2021(Updated: )
A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Packaged Contact Center Enterprise | ||
Cisco Unified Contact Center Enterprise | ||
Cisco Unified Contact Center Express | <=12.5\(1\) | |
Cisco Unified Intelligence Center | <=12.0\(1\) | |
Cisco Unified Intelligence Center | =12.5\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1395 is a vulnerability in the web-based management interface of Cisco Unified Intelligence Center that could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack.
The severity of CVE-2021-1395 is medium, with a CVSS severity score of 6.1.
Cisco Packaged Contact Center Enterprise, Cisco Unified Contact Center Enterprise, Cisco Unified Contact Center Express version 12.5(1), and Cisco Unified Intelligence Center version 12.0(1) and 12.5(1) are affected by CVE-2021-1395.
An attacker can exploit CVE-2021-1395 by conducting a cross-site scripting (XSS) attack against a user of the web-based management interface of Cisco Unified Intelligence Center.
Yes, Cisco has released a security advisory with mitigation details. Please refer to the official Cisco security advisory for more information.