First published: Tue May 31 2022(Updated: )
Dell Wyse Management Suite 3.6.1 and below contains a Reflected Cross-Site Scripting Vulnerability in saveGroupConfigurations page. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell Wyse Management Suite | <=3.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Dell Wyse Management Suite 3.6.1 and below contains a Reflected Cross-Site Scripting Vulnerability in the saveGroupConfigurations page, allowing an authenticated attacker to execute malicious HTML or JavaScript code in a victim user's web browser.
CVE-2022-29096 has a severity rating of 5.4, which is considered a medium severity vulnerability.
An authenticated attacker can exploit the Dell Wyse Management Suite 3.6.1 and below Reflected Cross-Site Scripting Vulnerability by injecting malicious HTML or JavaScript code in the saveGroupConfigurations page.
Dell Wyse Management Suite version up to and including 3.6.1 is affected by CVE-2022-29096.
Yes, Dell has released a security update for Dell Wyse Management Suite to address multiple vulnerabilities, including CVE-2022-29096. Please refer to the Dell support website for more information.