Lucene search

K
ciscoCiscoCISCO-SA-20151029-FSMC1
HistoryOct 29, 2015 - 12:00 a.m.

Cisco FireSIGHT Management Center Cross-Site Scripting Vulnerability

2015-10-2900:00:00
tools.cisco.com
16

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

30.1%

A vulnerability in the web framework of Cisco FireSIGHT Management Center (MC) could allow an authenticated, remote attacker to execute a stored cross-site scripting (XSS) attack against the user of the web
interface.

The vulnerability is due to improper sanitization of parameter values. An attacker could exploit this vulnerability by injecting malicious code into an affected parameter and then convincing the user to access a web page that triggers the execution of the injected code.

Cisco has not released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.

This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151029-fsmc1[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151029-fsmc1”]

Affected configurations

Vulners
Node
ciscofirepower_system_softwareMatchany
OR
ciscofirepower_system_softwareMatchany

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

30.1%

Related for CISCO-SA-20151029-FSMC1