CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
49.6%
A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
[
{
"vendor": "Cisco",
"product": "Cisco Unified Contact Center Enterprise",
"versions": [
{
"version": "N/A",
"status": "affected"
}
]
},
{
"vendor": "Cisco",
"product": "Cisco Unified Contact Center Express",
"versions": [
{
"version": "11.0(1)SU1",
"status": "affected"
},
{
"version": "12.0(1)",
"status": "affected"
},
{
"version": "12.5(1)",
"status": "affected"
},
{
"version": "12.5(1)SU1",
"status": "affected"
},
{
"version": "12.5(1)SU2",
"status": "affected"
},
{
"version": "11.6(1)",
"status": "affected"
},
{
"version": "11.6(2)",
"status": "affected"
}
]
},
{
"vendor": "Cisco",
"product": "Cisco Unified Intelligence Center",
"versions": [
{
"version": "11.0(1)",
"status": "affected"
},
{
"version": "11.5(1)",
"status": "affected"
},
{
"version": "11.6(1)",
"status": "affected"
},
{
"version": "12.0(1)",
"status": "affected"
},
{
"version": "12.5(1)",
"status": "affected"
},
{
"version": "12.5(1)SU",
"status": "affected"
},
{
"version": "12.6(1)",
"status": "affected"
}
]
},
{
"vendor": "Cisco",
"product": "Cisco Packaged Contact Center Enterprise",
"versions": [
{
"version": "11.6(1)",
"status": "affected"
},
{
"version": "11.6(2)",
"status": "affected"
},
{
"version": "12.0(1)",
"status": "affected"
},
{
"version": "12.5(1)",
"status": "affected"
},
{
"version": "12.5(2)",
"status": "affected"
},
{
"version": "12.6(1)",
"status": "affected"
}
]
}
]