First published: Wed Jan 13 2021(Updated: )
A vulnerability in the web-based management interface of Cisco DNA Center software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need to have administrative credentials on the affected device. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-xss-HfV73cS3
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco DNA Center Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-dnac-xss-HfV73cS3 vulnerability is rated as having a high severity due to its potential for enabling cross-site scripting attacks.
To fix the cisco-sa-dnac-xss-HfV73cS3 vulnerability, users should apply the latest patches and updates provided by Cisco for the affected versions of Cisco DNA Center.
The cisco-sa-dnac-xss-HfV73cS3 vulnerability affects users of the web-based management interface of Cisco DNA Center software.
The cisco-sa-dnac-xss-HfV73cS3 vulnerability can lead to a cross-site scripting (XSS) attack being conducted by an authenticated remote attacker.
Yes, authentication is required for an attacker to exploit the cisco-sa-dnac-xss-HfV73cS3 vulnerability in Cisco DNA Center.