First published: Wed Jun 07 2023(Updated: )
A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an authenticated, remote attacker to conduct a stored cross-site
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Small Business 200 Series Smart Switches | ||
Cisco Small Business 200, 300, and 500 Series Switches | ||
Cisco Small Business 500 Series Stackable Managed Switches firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-smb-sxss-OPYJZUmE is critical as it allows an authenticated remote attacker to conduct a stored cross-site scripting attack.
To fix cisco-sa-smb-sxss-OPYJZUmE, apply the latest firmware updates provided by Cisco for affected switch models.
cisco-sa-smb-sxss-OPYJZUmE affects Cisco Small Business 200 Series, 300 Series, and 500 Series managed switches.
The impact of cisco-sa-smb-sxss-OPYJZUmE can include unauthorized access to sensitive information and manipulation of the web-based interface.
Yes, authentication is required to exploit cisco-sa-smb-sxss-OPYJZUmE, meaning the attacker must have valid credentials for the device.