Description
A vulnerability in the VPN web client services feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a browser that is accessing an affected device. This vulnerability is due to improper validation of user-supplied input to application endpoints. An attacker could exploit this vulnerability by persuading a user to follow a link designed to submit malicious input to the affected application. A successful exploit could allow the attacker to execute arbitrary HTML or script code in the browser in the context of the web services page.
Reserved 2023-11-08 | Published 2024-10-23 | Updated 2024-10-24 | Assigner
ciscoMEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Problem types
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Product status
9.8.1
affected
9.8.1.5
affected
9.8.1.7
affected
9.8.2
affected
9.8.2.8
affected
9.8.2.14
affected
9.8.2.15
affected
9.8.2.17
affected
9.8.2.20
affected
9.8.2.24
affected
9.8.2.26
affected
9.8.2.28
affected
9.8.2.33
affected
9.8.2.35
affected
9.8.2.38
affected
9.8.3.8
affected
9.8.3.11
affected
9.8.3.14
affected
9.8.3.16
affected
9.8.3.18
affected
9.8.3.21
affected
9.8.3
affected
9.8.3.26
affected
9.8.3.29
affected
9.8.4
affected
9.8.4.3
affected
9.8.4.7
affected
9.8.4.8
affected
9.8.4.10
affected
9.8.4.12
affected
9.8.4.15
affected
9.8.4.17
affected
9.8.2.45
affected
9.8.4.25
affected
9.8.4.20
affected
9.8.4.22
affected
9.8.4.26
affected
9.8.4.29
affected
9.8.4.32
affected
9.8.4.33
affected
9.8.4.34
affected
9.8.4.35
affected
9.8.4.39
affected
9.8.4.40
affected
9.8.4.41
affected
9.8.4.43
affected
9.8.4.44
affected
9.8.4.45
affected
9.8.4.46
affected
9.8.4.48
affected
9.12.1
affected
9.12.1.2
affected
9.12.1.3
affected
9.12.2
affected
9.12.2.4
affected
9.12.2.5
affected
9.12.2.9
affected
9.12.3
affected
9.12.3.2
affected
9.12.3.7
affected
9.12.4
affected
9.12.3.12
affected
9.12.3.9
affected
9.12.2.1
affected
9.12.4.2
affected
9.12.4.4
affected
9.12.4.7
affected
9.12.4.10
affected
9.12.4.13
affected
9.12.4.8
affected
9.12.4.18
affected
9.12.4.24
affected
9.12.4.26
affected
9.12.4.29
affected
9.12.4.30
affected
9.12.4.35
affected
9.12.4.37
affected
9.12.4.38
affected
9.12.4.39
affected
9.12.4.40
affected
9.12.4.41
affected
9.12.4.47
affected
9.12.4.48
affected
9.12.4.50
affected
9.12.4.52
affected
9.12.4.54
affected
9.12.4.55
affected
9.12.4.56
affected
9.12.4.58
affected
9.12.4.62
affected
9.12.4.65
affected
9.12.4.67
affected
9.14.1
affected
9.14.1.10
affected
9.14.1.6
affected
9.14.1.15
affected
9.14.1.19
affected
9.14.1.30
affected
9.14.2
affected
9.14.2.4
affected
9.14.2.8
affected
9.14.2.13
affected
9.14.2.15
affected
9.14.3
affected
9.14.3.1
affected
9.14.3.9
affected
9.14.3.11
affected
9.14.3.13
affected
9.14.3.18
affected
9.14.3.15
affected
9.14.4
affected
9.14.4.6
affected
9.14.4.7
affected
9.14.4.12
affected
9.14.4.13
affected
9.14.4.14
affected
9.14.4.15
affected
9.14.4.17
affected
9.14.4.22
affected
9.14.4.23
affected
9.14.4.24
affected
9.15.1
affected
9.15.1.7
affected
9.15.1.10
affected
9.15.1.15
affected
9.15.1.16
affected
9.15.1.17
affected
9.15.1.1
affected
9.15.1.21
affected
9.16.1
affected
9.16.1.28
affected
9.16.2
affected
9.16.2.3
affected
9.16.2.7
affected
9.16.2.11
affected
9.16.2.13
affected
9.16.2.14
affected
9.16.3
affected
9.16.3.3
affected
9.16.3.14
affected
9.16.3.15
affected
9.16.3.19
affected
9.16.3.23
affected
9.16.4
affected
9.16.4.9
affected
9.16.4.14
affected
9.16.4.18
affected
9.16.4.19
affected
9.16.4.27
affected
9.16.4.38
affected
9.16.4.39
affected
9.16.4.42
affected
9.16.4.48
affected
9.16.4.55
affected
9.16.4.57
affected
9.16.4.61
affected
9.17.1
affected
9.17.1.7
affected
9.17.1.9
affected
9.17.1.10
affected
9.17.1.11
affected
9.17.1.13
affected
9.17.1.15
affected
9.17.1.20
affected
9.17.1.30
affected
9.17.1.33
affected
9.17.1.39
affected
9.18.1
affected
9.18.1.3
affected
9.18.2
affected
9.18.2.5
affected
9.18.2.7
affected
9.18.2.8
affected
9.18.3
affected
9.18.3.39
affected
9.18.3.46
affected
9.18.3.53
affected
9.18.3.55
affected
9.18.3.56
affected
9.18.4
affected
9.18.4.5
affected
9.18.4.8
affected
9.18.4.22
affected
9.18.4.24
affected
9.18.4.29
affected
9.19.1
affected
9.19.1.5
affected
9.19.1.9
affected
9.19.1.12
affected
9.19.1.18
affected
9.19.1.22
affected
9.19.1.24
affected
9.19.1.27
affected
9.19.1.28
affected
9.19.1.31
affected
9.20.1
affected
9.20.1.5
affected
9.20.2
affected
9.20.2.10
affected
9.20.2.21
affected
9.20.2.22
affected
6.2.3
affected
6.2.3.1
affected
6.2.3.2
affected
6.2.3.3
affected
6.2.3.4
affected
6.2.3.5
affected
6.2.3.6
affected
6.2.3.7
affected
6.2.3.8
affected
6.2.3.10
affected
6.2.3.11
affected
6.2.3.9
affected
6.2.3.12
affected
6.2.3.13
affected
6.2.3.14
affected
6.2.3.15
affected
6.2.3.16
affected
6.2.3.17
affected
6.2.3.18
affected
6.6.0
affected
6.6.0.1
affected
6.6.1
affected
6.6.3
affected
6.6.4
affected
6.6.5
affected
6.6.5.1
affected
6.6.5.2
affected
6.6.7
affected
6.6.7.1
affected
6.6.7.2
affected
6.4.0
affected
6.4.0.1
affected
6.4.0.3
affected
6.4.0.2
affected
6.4.0.4
affected
6.4.0.5
affected
6.4.0.6
affected
6.4.0.7
affected
6.4.0.8
affected
6.4.0.9
affected
6.4.0.10
affected
6.4.0.11
affected
6.4.0.12
affected
6.4.0.13
affected
6.4.0.14
affected
6.4.0.15
affected
6.4.0.16
affected
6.4.0.17
affected
6.4.0.18
affected
6.7.0
affected
6.7.0.1
affected
6.7.0.2
affected
6.7.0.3
affected
7.0.0
affected
7.0.0.1
affected
7.0.1
affected
7.0.1.1
affected
7.0.2
affected
7.0.2.1
affected
7.0.3
affected
7.0.4
affected
7.0.5
affected
7.0.6
affected
7.0.6.1
affected
7.0.6.2
affected
7.1.0
affected
7.1.0.1
affected
7.1.0.2
affected
7.1.0.3
affected
7.2.0
affected
7.2.0.1
affected
7.2.1
affected
7.2.2
affected
7.2.3
affected
7.2.4
affected
7.2.4.1
affected
7.2.5
affected
7.2.5.1
affected
7.2.6
affected
7.2.7
affected
7.2.5.2
affected
7.2.8
affected
7.2.8.1
affected
7.3.0
affected
7.3.1
affected
7.3.1.1
affected
7.3.1.2
affected
7.4.0
affected
7.4.1
affected
7.4.1.1
affected
7.4.2
affected
References
sec.cloudapps.cisco.com/...sory/cisco-sa-asaftd-xss-yjj7ZjVq (cisco-sa-asaftd-xss-yjj7ZjVq)
cve.org (CVE-2024-20382)
nvd.nist.gov (CVE-2024-20382)
Download JSON
Subscribe to our newsletter to learn more about our work.