First published: Mon Mar 04 2024(Updated: )
Forcepoint NGFW Security Management Center Management Server has SMC Downloads optional feature to offer standalone Management Client downloads and ECA configuration downloads. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Forcepoint Next Generation Firewall Security Management Center (SMC Downloads feature) allows Reflected XSS. This issue affects Next Generation Firewall Security Management Center : before 6.10.13, from 6.11.0 before 7.1.2.
Credit: psirt@forcepoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Forcepoint Next Generation Firewall Security Management Center | <6.10.13>=6.11.0<7.1.2 |
The vulnerability has been fixed in the SMC releases 6.10.13 and 7.1.2.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5451 has been classified as a medium severity vulnerability due to its impact on the security of web applications.
To remediate CVE-2023-5451, update your Forcepoint Next Generation Firewall Security Management Center to version 6.11.0 or later, or ensure that you are running a version higher than 7.1.2.
CVE-2023-5451 affects the Forcepoint Next Generation Firewall Security Management Center, specifically versions up to 6.10.13 and between 6.11.0 and 7.1.2.
CVE-2023-5451 is categorized as a Cross-site Scripting (XSS) vulnerability, which allows attackers to inject malicious scripts into web pages.
Yes, CVE-2023-5451 can potentially be exploited remotely if a user interacts with a compromised web page served by the affected application.