Lucene search

K
cvelistCiscoCVELIST:CVE-2024-20405
HistoryJun 05, 2024 - 4:15 p.m.

CVE-2024-20405

2024-06-0516:15:22
cisco
www.cve.org
4
cve-2024-20405
cisco finesse
web interface
vulnerability
stored xss attack
unauthenticated
remote attacker
rfi vulnerability
validation
http requests
exploit
crafted link
arbitrary script code
sensitive information

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

AI Score

5.3

Confidence

High

EPSS

0.001

Percentile

16.9%

A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct a stored XSS attack by exploiting an RFI vulnerability.

This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected device. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive information on the affected device.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Unified Contact Center Enterprise",
    "versions": [
      {
        "version": "N/A",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Cisco",
    "product": "Cisco Unified Contact Center Express",
    "versions": [
      {
        "version": "N/A",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Cisco",
    "product": "Cisco Finesse",
    "versions": [
      {
        "version": "12.6(2)",
        "status": "affected"
      },
      {
        "version": "12.6(2)ES1",
        "status": "affected"
      },
      {
        "version": "12.6(2)ES2",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Cisco",
    "product": "Cisco Packaged Contact Center Enterprise",
    "versions": [
      {
        "version": "N/A",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

AI Score

5.3

Confidence

High

EPSS

0.001

Percentile

16.9%

Related for CVELIST:CVE-2024-20405