Lucene search

K
cvelistCiscoCVELIST:CVE-2023-20053
HistoryFeb 16, 2023 - 3:27 p.m.

CVE-2023-20053

2023-02-1615:27:54
cisco
www.cve.org
1
cisco nexus dashboard
web interface
remote attacker
xss attack
user input validation
crafted link
arbitrary script code

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

45.7%

A vulnerability in the web-based management interface of Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.

This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Nexus Dashboard",
    "versions": [
      {
        "version": "1.1(0c)",
        "status": "affected"
      },
      {
        "version": "1.1(0d)",
        "status": "affected"
      },
      {
        "version": "1.1(2h)",
        "status": "affected"
      },
      {
        "version": "1.1(2i)",
        "status": "affected"
      },
      {
        "version": "1.1(3c)",
        "status": "affected"
      },
      {
        "version": "1.1(3d)",
        "status": "affected"
      },
      {
        "version": "1.1(3e)",
        "status": "affected"
      },
      {
        "version": "1.1(3f)",
        "status": "affected"
      },
      {
        "version": "2.0(1b)",
        "status": "affected"
      },
      {
        "version": "2.0(1d)",
        "status": "affected"
      },
      {
        "version": "2.0(2g)",
        "status": "affected"
      },
      {
        "version": "2.0(2h)",
        "status": "affected"
      },
      {
        "version": "2.1(1d)",
        "status": "affected"
      },
      {
        "version": "2.1(1e)",
        "status": "affected"
      },
      {
        "version": "2.1(2d)",
        "status": "affected"
      },
      {
        "version": "2.1(2f)",
        "status": "affected"
      },
      {
        "version": "2.2(1e)",
        "status": "affected"
      },
      {
        "version": "2.2(1h)",
        "status": "affected"
      },
      {
        "version": "2.2(2d)",
        "status": "affected"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

45.7%

Related for CVELIST:CVE-2023-20053