First published: Thu Jan 19 2023(Updated: )
A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform, Cisco BroadWorks Application Server, and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco BroadWorks Application Delivery Platform | <commpilot-24_2022.11 | |
Cisco BroadWorks Application Server | <ap.as.24.0.944.ap384344 | |
Cisco BroadWorks Xtended Services Platform | <ap.xsp.23.0.1075.ap384344 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20019 is a vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform, Cisco BroadWorks Application Server, and Cisco BroadWorks Xtended Services Platform that allows an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user.
The severity of CVE-2023-20019 is medium with a CVSS score of 6.1.
An unauthenticated attacker can exploit CVE-2023-20019 by conducting a cross-site scripting (XSS) attack against a user through the web-based management interface of the affected Cisco platforms.
CVE-2023-20019 affects Cisco BroadWorks Application Delivery Platform, Cisco BroadWorks Application Server, and Cisco BroadWorks Xtended Services Platform.
Yes, Cisco has released a security advisory with remediation steps to address CVE-2023-20019. Please refer to the Cisco Security Advisory for more information.