First published: Wed Nov 04 2020(Updated: )
A vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanxsshi-9KHEqRpM
Credit: Franek Kalinowski Pawel Haldrzynski with ISEC.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-vmanxsshi-9KHEqRpM is classified as high due to the potential for cross-site scripting attacks.
To fix cisco-sa-vmanxsshi-9KHEqRpM, ensure you update to the latest version of Cisco SD-WAN vManage Software provided by Cisco.
All users of the Cisco SD-WAN vManage Software with access to the web-based management interface are affected by cisco-sa-vmanxsshi-9KHEqRpM.
cisco-sa-vmanxsshi-9KHEqRpM is associated with cross-site scripting (XSS) attacks.
Yes, authentication is required for an attacker to exploit cisco-sa-vmanxsshi-9KHEqRpM.