First published: Wed Jul 18 2018(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface, conduct a cross-site request forgery (CSRF) attack, or retrieve a cleartext password. For more information about these vulnerabilities, see the Details section of this advisory. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-uccx
Credit: Filip Waeytens NCI Agency Cyber Security for reporting these vulnerabilities
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Contact Center Express Enhanced |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of cisco-sa-20180718-uccx is considered critical due to the potential for unauthenticated remote attacks.
To fix cisco-sa-20180718-uccx, it is recommended to apply the latest patches provided by Cisco for Unified Contact Center Express.
cisco-sa-20180718-uccx is associated with cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks.
Organizations using Cisco Unified Contact Center Express are directly affected by cisco-sa-20180718-uccx.
No, cisco-sa-20180718-uccx can be exploited by an unauthenticated, remote attacker.