First published: Wed Aug 21 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager Session Management Edition | ||
Cisco Unified Communications Manager Session Management Edition |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-cucm-xss-9zmfHyZ is classified as high due to the potential for unauthenticated remote attackers to execute cross-site scripting attacks.
To remediate cisco-sa-cucm-xss-9zmfHyZ, apply the latest security patches provided by Cisco for affected products.
Cisco Unified Communications Manager and Cisco Unified Communications Manager Session Management Edition users are affected by cisco-sa-cucm-xss-9zmfHyZ.
Due to cisco-sa-cucm-xss-9zmfHyZ, attackers can conduct cross-site scripting (XSS) attacks via the web-based management interface.
No, authentication is not required to exploit cisco-sa-cucm-xss-9zmfHyZ, allowing unauthenticated attackers to conduct the exploit.