We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2020-3532

Cisco Unified Communications Products Cross-Site Scripting Vulnerability



Description

A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.There are no workarounds that address this vulnerability.

Reserved 2019-12-12 | Published 2024-11-18 | Updated 2024-11-18 | Assigner cisco


MEDIUM: 6.1CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:X/RL:X/RC:X

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Any version
affected

Any version
affected

Any version
affected

Any version
affected

References

sec.cloudapps.cisco.com/...isco-sa-cucm-cuc-imp-xss-XtpzfM5e (cisco-sa-cucm-cuc-imp-xss-XtpzfM5e)

sec.cloudapps.cisco.com/...ory/cisco-sa-esa-tls-dos-xW53TBhb

sec.cloudapps.cisco.com/...cisco-sa-dcnm-authbypass-YVJzqgk2

sec.cloudapps.cisco.com/...ry/cisco-sa-dcnm-pa-trav-bMdfSTTq

cve.org (CVE-2020-3532)

nvd.nist.gov (CVE-2020-3532)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2020-3532

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.