First published: Wed Jul 17 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to redirect a user to a malicious web page.This vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Expressway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-expressway-redirect-KJsFuXgj is considered high due to the potential for exploitation by unauthenticated, remote attackers.
To fix cisco-sa-expressway-redirect-KJsFuXgj, you should apply the latest patches and updates provided by Cisco for the Expressway Series.
The vulnerability affects users of the Cisco Expressway Series web-based management interface.
cisco-sa-expressway-redirect-KJsFuXgj can facilitate attacks that lead to users being redirected to malicious web pages.
No, cisco-sa-expressway-redirect-KJsFuXgj can be exploited by unauthenticated, remote attackers.