First published: Thu Nov 04 2021(Updated: )
A vulnerability in the web-based management interface of Cisco Webex Video Mesh could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the URL parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. Attackers may use this type of vulnerability, known as an open redirect attack, as part of a phishing attack to persuade users to unknowingly visit malicious sites.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Collaboration Meeting Rooms | =2.0 | |
Cisco Webex Video Mesh | <2021.10.18.2439m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1500 is a vulnerability in the web-based management interface of Cisco Webex Video Mesh that could allow an unauthenticated, remote attacker to redirect a user to a malicious web page.
The severity of CVE-2021-1500 is medium, with a CVSS score of 6.1.
Cisco Collaboration Meeting Rooms version 2.0 and Cisco Webex Video Mesh up to version 2021.10.18.2439m are affected by CVE-2021-1500.
An attacker can exploit CVE-2021-1500 by exploiting improper input validation of URL parameters in an HTTP request.
For more information about CVE-2021-1500, you can visit the Cisco Security Advisory at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmesh-openred-AGNRmf5.