First published: Thu Nov 04 2021(Updated: )
A vulnerability in the web-based management interface of Cisco Prime Access Registrar could allow an authenticated, remote attacker to perform a stored cross-site scripting attack on an affected system. This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid administrative credentials. Cisco expects to release software updates that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Access Registrar | <9.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34731 is rated as a medium severity vulnerability.
To fix CVE-2021-34731, upgrade the Cisco Prime Access Registrar to version 9.2.1 or higher.
CVE-2021-34731 affects users of Cisco Prime Access Registrar versions prior to 9.2.1.
Yes, CVE-2021-34731 can be exploited by an authenticated remote attacker.
CVE-2021-34731 enables a stored cross-site scripting (XSS) attack.