First published: Wed Jun 05 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct a stored XSS attack by exploiting an RFI vulnerability. This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected device. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive information on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Finesse | <11.6\(1\) | |
Cisco Finesse | =11.6\(1\) | |
Cisco Finesse | =11.6\(1\)-es4 | |
Cisco Finesse | =11.6\(1\)-es5 | |
Cisco Finesse | =11.6\(1\)-es6 | |
Cisco Finesse | =11.6\(1\)-es7 | |
Cisco Finesse | =11.6\(1\)-es8 | |
Cisco Finesse | =12.6\(2\) | |
Cisco Finesse | =12.6\(2\)-es01 | |
Cisco Finesse | =12.6\(2\)-es02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20405 is classified as a critical vulnerability due to its potential for remote exploitation and the impact of stored XSS attacks.
To remediate CVE-2024-20405, ensure that your Cisco Finesse software is updated to the latest version that addresses the vulnerability.
CVE-2024-20405 affects Cisco Finesse versions up to 11.6(1) and certain versions of 12.6(2).
CVE-2024-20405 allows an unauthenticated, remote attacker to conduct stored XSS attacks.
The vulnerability in CVE-2024-20405 is due to insufficient validation of user-supplied input for specific HTTP requests.