CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
EPSS
Percentile
56.1%
A vulnerability in the wireless configuration module of Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to insert scripts into the listing of rogue access points.
The vulnerability is due to a failure to properly sanitize SSIDs before inserting them into the XML windowing table used to display the list of rogue access points. An attacker could exploit this vulnerability by using a script as the SSID of a rogue access point. A successful exploit could allow the attacker to to execute scripts in the browser of a user viewing the malicious SSID.
Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.
To exploit this vulnerability, the attacker would likely need access to a trusted, internal network in order to use a malicious script as the SSID of a rogue access point or have the knowledge of whether rogue access points exist in the network.
Customers are advised to review the bug reports in the “Vendor Announcements” section for a current list of affected versions.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | prime_infrastructure | any | cpe:2.3:a:cisco:prime_infrastructure:any:*:*:*:*:*:*:* |