First published: Thu Nov 03 2022(Updated: )
A vulnerability in multiple management dashboard pages of Cisco Umbrella could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the Cisco Umbrella dashboard. This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to the web application and persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Umbrella | =003.003\(000\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-20969 is classified as medium due to its potential for cross-site scripting attacks.
To fix CVE-2022-20969, ensure that you update to the latest version of Cisco Umbrella where the vulnerability has been patched.
CVE-2022-20969 affects users of Cisco Umbrella version 003.003(000) and possibly other versions if unpatched.
CVE-2022-20969 allows authenticated remote attackers to perform cross-site scripting (XSS) attacks against Cisco Umbrella dashboard users.
The vulnerability in CVE-2022-20969 is caused by unsanitized user input within multiple management dashboard pages of Cisco Umbrella.