First published: Wed Aug 15 2018(Updated: )
A vulnerability in Cisco Unified Communications Domain Manager Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on an affected system. The vulnerability is due to improper validation of input that is passed to the affected software. An attacker could exploit this vulnerability by persuading a user of the affected software to access a malicious URL. A successful exploit could allow the attacker to access sensitive, browser-based information on the affected system or perform arbitrary actions in the affected software in the security context of the user. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-cucdm-xss
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Domain Manager Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180815-cucdm-xss is considered high due to its potential for allowing unauthenticated remote attackers to perform cross-site scripting attacks.
To fix cisco-sa-20180815-cucdm-xss, upgrade to the latest version of Cisco Unified Communications Domain Manager that contains the patch addressing this vulnerability.
cisco-sa-20180815-cucdm-xss enables cross-site scripting (XSS) attacks, allowing attackers to inject malicious scripts into webpages viewed by users.
Organizations using vulnerable versions of Cisco Unified Communications Domain Manager are affected by cisco-sa-20180815-cucdm-xss.
No, authentication is not required to exploit cisco-sa-20180815-cucdm-xss, making it more critical for remediation.