First published: Wed Oct 23 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Firewall Management Center | =7.3.0 | |
Cisco Secure Firewall Management Center | =7.3.1 | |
Cisco Secure Firewall Management Center | =7.3.1.1 | |
Cisco Secure Firewall Management Center | =7.3.1.2 | |
Cisco Secure Firewall Management Center | =7.4.0 | |
Cisco Secure Firewall Management Center | =7.4.1 | |
Cisco Secure Firewall Management Center | =7.4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20298 has been classified as a high severity vulnerability.
CVE-2024-20298 allows an authenticated, remote attacker to exploit a cross-site scripting (XSS) vulnerability in the web-based management interface.
CVE-2024-20298 affects Cisco Secure Firewall Management Center version 7.3.0 through 7.4.1.1.
To fix CVE-2024-20298, update your Cisco Secure Firewall Management Center to the latest recommended version as provided by Cisco.
CVE-2024-20298 can be leveraged to conduct a cross-site scripting (XSS) attack against users of the Cisco Firepower Management Center interface.