6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
45.7%
A vulnerability in the web-based management interface of Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.
This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
[
{
"vendor": "Cisco",
"product": "Cisco Nexus Dashboard",
"versions": [
{
"version": "1.1(0c)",
"status": "affected"
},
{
"version": "1.1(0d)",
"status": "affected"
},
{
"version": "1.1(2h)",
"status": "affected"
},
{
"version": "1.1(2i)",
"status": "affected"
},
{
"version": "1.1(3c)",
"status": "affected"
},
{
"version": "1.1(3d)",
"status": "affected"
},
{
"version": "1.1(3e)",
"status": "affected"
},
{
"version": "1.1(3f)",
"status": "affected"
},
{
"version": "2.0(1b)",
"status": "affected"
},
{
"version": "2.0(1d)",
"status": "affected"
},
{
"version": "2.0(2g)",
"status": "affected"
},
{
"version": "2.0(2h)",
"status": "affected"
},
{
"version": "2.1(1d)",
"status": "affected"
},
{
"version": "2.1(1e)",
"status": "affected"
},
{
"version": "2.1(2d)",
"status": "affected"
},
{
"version": "2.1(2f)",
"status": "affected"
},
{
"version": "2.2(1e)",
"status": "affected"
},
{
"version": "2.2(1h)",
"status": "affected"
},
{
"version": "2.2(2d)",
"status": "affected"
}
]
}
]