First published: Wed Jul 19 2023(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) or HTML injection attacks.For more information about these vulnerabilities, see the
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SPA500 Series IP Phones firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-spa-web-multi-7kvPmu2F is rated as medium due to the potential for cross-site scripting (XSS) and HTML injection vulnerabilities.
To fix cisco-sa-spa-web-multi-7kvPmu2F, ensure that your Cisco Small Business SPA500 Series IP Phones are updated to the latest firmware version provided by Cisco.
cisco-sa-spa-web-multi-7kvPmu2F allows for cross-site scripting (XSS) and HTML injection attacks, which can be utilized by attackers to manipulate user sessions or redirect users.
Yes, all models within the Cisco Small Business SPA500 Series IP Phones are affected by the vulnerabilities identified in cisco-sa-spa-web-multi-7kvPmu2F.
No, exploitation of cisco-sa-spa-web-multi-7kvPmu2F does not require authentication, making it particularly concerning for network security.