First published: Wed Oct 03 2018(Updated: )
A vulnerability in the web-based management interface of Cisco Unified IP Phone 7900 Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-uipp-7900-xss
Credit: Yavuz Atlas.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified IP Phone 7900 Series Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20181003-uipp-7900-xss is classified as high due to the potential for unauthenticated remote attacks.
cisco-sa-20181003-uipp-7900-xss allows for a cross-site scripting (XSS) attack against users of the web-based management interface.
To mitigate the cisco-sa-20181003-uipp-7900-xss vulnerability, it is recommended to apply the latest firmware updates for the Cisco Unified IP Phone 7900 Series.
Users of the Cisco Unified IP Phone 7900 Series who utilize the web-based management interface are affected by cisco-sa-20181003-uipp-7900-xss.
No, authentication is not required to exploit the cisco-sa-20181003-uipp-7900-xss vulnerability.