First published: Thu Apr 08 2021(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against an interface user. These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading an interface user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager | <14 | |
Cisco Unified Communications Manager | <14 | |
Cisco Unified Communications Manager Im \& Presence Service | <14 | |
Cisco Unity Connection | <14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-1409 is medium, with a CVSS score of 6.1.
The affected software includes Cisco Unified Communications Manager, Cisco Unified Communications Manager IM & Presence Service, Cisco Unified Communications Manager Session Management Edition, and Cisco Unity Connection.
To fix CVE-2021-1409, apply the necessary security patches or updates provided by Cisco.
The Common Weakness Enumeration (CWE) for CVE-2021-1409 includes CWE-79 (Cross-Site Scripting) and CWE-89 (SQL Injection).
You can find more information about CVE-2021-1409 on the Cisco Security Advisory page: [link](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-xss-Q4PZcNzJ)