First published: Wed Jul 17 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a malicious web page. Note: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20400 is classified as a medium-severity vulnerability.
To fix CVE-2024-20400, update your Cisco Expressway Series to the latest software version that addresses this vulnerability.
CVE-2024-20400 affects the Cisco Expressway Series management interface.
An unauthenticated, remote attacker could exploit CVE-2024-20400 to redirect users to a malicious web page.
Check if your Cisco Expressway Series is running a version that does not include the patch for CVE-2024-20400.