First published: Wed Feb 19 2025(Updated: )
A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface.This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-GDPgJ58P
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco BroadWorks Application Delivery Platform Device Management |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-broadworks-xss-GDPgJ58P is high due to its potential for cross-site scripting attacks.
To fix cisco-sa-broadworks-xss-GDPgJ58P, ensure that you update the Cisco BroadWorks Application Delivery Platform software to the latest version provided by Cisco.
Users of the Cisco BroadWorks Application Delivery Platform are affected by cisco-sa-broadworks-xss-GDPgJ58P.
cisco-sa-broadworks-xss-GDPgJ58P can allow attackers to perform cross-site scripting attacks.
No, cisco-sa-broadworks-xss-GDPgJ58P can be exploited by an unauthenticated, remote attacker.