First published: Thu Jan 19 2023(Updated: )
A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Packaged Contact Center Enterprise | >=9.0\(1\)<12.5\(1\)_su2_es05 | |
Cisco Packaged Contact Center Enterprise | >=12.5\(1\)_su2<12.5\(1\)_su2_es05 | |
Cisco Unified Contact Center Enterprise | <12.5\(1\)_es02 | |
Cisco Unified Contact Center Enterprise | >=12.5\(2\)<12.6\(1\)_es06 | |
Cisco Unified Contact Center Enterprise | >=12.6\(1\)<12.6\(1\)_es06 | |
Cisco Unified Contact Center Express | <12.5\(1\)_su2_es05 | |
Cisco Unified Contact Center Express | >=12.5\(1\)_su2<12.5\(1\)_su2_es05 | |
Cisco Unified Intelligence Center | <12.5\(1\)_es02 | |
Cisco Unified Intelligence Center | >=12.6\(1\)<12.6\(1\)_es06 | |
Cisco Unified Intelligence Center | >=12.6\(1\)_es2<12.6\(1\)_es06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-20058.
The severity rating of CVE-2023-20058 is 6.1 (medium).
The affected software for CVE-2023-20058 is Cisco Packaged Contact Center Enterprise, Cisco Unified Contact Center Enterprise, Cisco Unified Contact Center Express, and Cisco Unified Intelligence Center.
The CWE ID for CVE-2023-20058 is CWE-79.
To fix the vulnerability CVE-2023-20058, it is recommended to update to the latest version of the affected software or apply the necessary patches provided by Cisco.