Lucene search

K
cve[email protected]CVE-2024-20346
HistoryMar 06, 2024 - 5:15 p.m.

CVE-2024-20346

2024-03-0617:15:10
CWE-79
web.nvd.nist.gov
43
cve-2024-20346
cisco
appdynamics
controller
vulnerability
web interface
xss
remote attack
nvd

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.0004 Low

EPSS

Percentile

9.0%

A vulnerability in the web-based management interface of Cisco AppDynamics Controller could allow an authenticated, remote attacker to perform a reflected cross-site scripting (XSS) attack against a user of the interface of an affected device.

This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco AppDynamics",
    "versions": [
      {
        "version": "21.2.0",
        "status": "affected"
      },
      {
        "version": "21.2.1",
        "status": "affected"
      },
      {
        "version": "21.2.2",
        "status": "affected"
      },
      {
        "version": "21.2.3",
        "status": "affected"
      },
      {
        "version": "21.2.6",
        "status": "affected"
      },
      {
        "version": "21.2.7",
        "status": "affected"
      },
      {
        "version": "21.2.8",
        "status": "affected"
      },
      {
        "version": "21.4.0",
        "status": "affected"
      },
      {
        "version": "21.4.10",
        "status": "affected"
      },
      {
        "version": "21.4.11",
        "status": "affected"
      },
      {
        "version": "21.4.2",
        "status": "affected"
      },
      {
        "version": "21.4.3",
        "status": "affected"
      },
      {
        "version": "21.4.4",
        "status": "affected"
      },
      {
        "version": "21.4.5",
        "status": "affected"
      },
      {
        "version": "21.4.6",
        "status": "affected"
      },
      {
        "version": "21.4.7",
        "status": "affected"
      },
      {
        "version": "21.4.8",
        "status": "affected"
      },
      {
        "version": "21.4.9",
        "status": "affected"
      },
      {
        "version": "21.11.0",
        "status": "affected"
      },
      {
        "version": "21.5.0",
        "status": "affected"
      },
      {
        "version": "21.6.0",
        "status": "affected"
      },
      {
        "version": "21.12.0",
        "status": "affected"
      },
      {
        "version": "21.12.2",
        "status": "affected"
      },
      {
        "version": "21.12.1",
        "status": "affected"
      },
      {
        "version": "22.1.0",
        "status": "affected"
      },
      {
        "version": "22.1.1",
        "status": "affected"
      },
      {
        "version": "22.11.0",
        "status": "affected"
      },
      {
        "version": "22.3.0",
        "status": "affected"
      },
      {
        "version": "22.10.0",
        "status": "affected"
      },
      {
        "version": "22.12.0",
        "status": "affected"
      },
      {
        "version": "22.12.1",
        "status": "affected"
      },
      {
        "version": "21.7.0",
        "status": "affected"
      },
      {
        "version": "22.8.0",
        "status": "affected"
      },
      {
        "version": "23.2.0",
        "status": "affected"
      },
      {
        "version": "23.4.0",
        "status": "affected"
      },
      {
        "version": "23.7.1",
        "status": "affected"
      },
      {
        "version": "23.7.0",
        "status": "affected"
      }
    ]
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.0004 Low

EPSS

Percentile

9.0%

Related for CVE-2024-20346