Lucene search

K
ciscoCiscoCISCO-SA-20150114-CVE-2015-0577
HistoryJan 14, 2015 - 6:54 p.m.

Cisco AsyncOS ISQ XSS Vulnerability

2015-01-1418:54:06
tools.cisco.com
16

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

65.5%

A vulnerability in the web framework of Cisco AsyncOS could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface on the affected system.

The vulnerability is due to insufficient input validation of several parameters in the IronPort Spam Quarantine web page. An attacker could exploit this vulnerability by persuading a user to access a malicious link.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the link.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscosecure_email_gatewayMatchany
OR
ciscosecure_email_and_web_managerMatchany
OR
ciscosecure_email_gatewayMatchany
OR
ciscosecure_email_and_web_managerMatchany
VendorProductVersionCPE
ciscosecure_email_gatewayanycpe:2.3:a:cisco:secure_email_gateway:any:*:*:*:*:*:*:*
ciscosecure_email_and_web_manageranycpe:2.3:o:cisco:secure_email_and_web_manager:any:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

65.5%

Related for CISCO-SA-20150114-CVE-2015-0577