Lucene search

K
ciscoCiscoCISCO-SA-SEC-WORK-XSS-T6SYTU8Q
HistoryOct 20, 2021 - 4:00 p.m.

Cisco Tetration Stored Cross-Site Scripting Vulnerability

2021-10-2016:00:00
tools.cisco.com
53
cisco
tetration
web-based
management
interface
stored
cross-site scripting
xss
attack
vulnerability
software
updates
administrative credentials

EPSS

0.001

Percentile

29.2%

A vulnerability in the web-based management interface of Cisco Tetration could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack on an affected system.

This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid administrative credentials.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sec-work-xss-t6SYtu8Q [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sec-work-xss-t6SYtu8Q”]

Affected configurations

Vulners
Node
ciscosecure_workloadMatchany
OR
ciscosecure_workloadMatchany
VendorProductVersionCPE
ciscosecure_workloadanycpe:2.3:a:cisco:secure_workload:any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

29.2%

Related for CISCO-SA-SEC-WORK-XSS-T6SYTU8Q