Lucene search

K
nvd[email protected]NVD:CVE-2022-20905
HistoryNov 15, 2022 - 9:15 p.m.

CVE-2022-20905

2022-11-1521:15:29
CWE-79
web.nvd.nist.gov
cisco
firepower management center
xss
user validation
remote attacker
stored attack
data fields
arbitrary code
sensitive information
availability impact

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

29.4%

Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device.

These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.

Affected configurations

NVD
Node
ciscofirepower_management_centerMatch6.1.0
OR
ciscofirepower_management_centerMatch6.1.0.1
OR
ciscofirepower_management_centerMatch6.1.0.2
OR
ciscofirepower_management_centerMatch6.1.0.3
OR
ciscofirepower_management_centerMatch6.1.0.4
OR
ciscofirepower_management_centerMatch6.1.0.5
OR
ciscofirepower_management_centerMatch6.1.0.6
OR
ciscofirepower_management_centerMatch6.1.0.7
OR
ciscofirepower_management_centerMatch6.2.0
OR
ciscofirepower_management_centerMatch6.2.0.1
OR
ciscofirepower_management_centerMatch6.2.0.2
OR
ciscofirepower_management_centerMatch6.2.0.3
OR
ciscofirepower_management_centerMatch6.2.0.4
OR
ciscofirepower_management_centerMatch6.2.0.5
OR
ciscofirepower_management_centerMatch6.2.0.6
OR
ciscofirepower_management_centerMatch6.2.1
OR
ciscofirepower_management_centerMatch6.2.2
OR
ciscofirepower_management_centerMatch6.2.2.1
OR
ciscofirepower_management_centerMatch6.2.2.2
OR
ciscofirepower_management_centerMatch6.2.2.3
OR
ciscofirepower_management_centerMatch6.2.2.4
OR
ciscofirepower_management_centerMatch6.2.2.5
OR
ciscofirepower_management_centerMatch6.2.3
OR
ciscofirepower_management_centerMatch6.2.3.1
OR
ciscofirepower_management_centerMatch6.2.3.2
OR
ciscofirepower_management_centerMatch6.2.3.3
OR
ciscofirepower_management_centerMatch6.2.3.4
OR
ciscofirepower_management_centerMatch6.2.3.5
OR
ciscofirepower_management_centerMatch6.2.3.6
OR
ciscofirepower_management_centerMatch6.2.3.7
OR
ciscofirepower_management_centerMatch6.2.3.9
OR
ciscofirepower_management_centerMatch6.2.3.10
OR
ciscofirepower_management_centerMatch6.2.3.11
OR
ciscofirepower_management_centerMatch6.2.3.12
OR
ciscofirepower_management_centerMatch6.2.3.13
OR
ciscofirepower_management_centerMatch6.2.3.14
OR
ciscofirepower_management_centerMatch6.2.3.15
OR
ciscofirepower_management_centerMatch6.2.3.16
OR
ciscofirepower_management_centerMatch6.2.3.17
OR
ciscofirepower_management_centerMatch6.2.3.18
OR
ciscofirepower_management_centerMatch6.3.0
OR
ciscofirepower_management_centerMatch6.3.0.1
OR
ciscofirepower_management_centerMatch6.3.0.2
OR
ciscofirepower_management_centerMatch6.3.0.3
OR
ciscofirepower_management_centerMatch6.3.0.4
OR
ciscofirepower_management_centerMatch6.3.0.5
OR
ciscofirepower_management_centerMatch6.4.0
OR
ciscofirepower_management_centerMatch6.4.0.1
OR
ciscofirepower_management_centerMatch6.4.0.2
OR
ciscofirepower_management_centerMatch6.4.0.3
OR
ciscofirepower_management_centerMatch6.4.0.4
OR
ciscofirepower_management_centerMatch6.4.0.5
OR
ciscofirepower_management_centerMatch6.4.0.7
OR
ciscofirepower_management_centerMatch6.4.0.8
OR
ciscofirepower_management_centerMatch6.4.0.9
OR
ciscofirepower_management_centerMatch6.4.0.10
OR
ciscofirepower_management_centerMatch6.4.0.11
OR
ciscofirepower_management_centerMatch6.4.0.12
OR
ciscofirepower_management_centerMatch6.4.0.13
OR
ciscofirepower_management_centerMatch6.4.0.14
OR
ciscofirepower_management_centerMatch6.4.0.15
OR
ciscofirepower_management_centerMatch6.5.0
OR
ciscofirepower_management_centerMatch6.5.0.1
OR
ciscofirepower_management_centerMatch6.5.0.2
OR
ciscofirepower_management_centerMatch6.5.0.3
OR
ciscofirepower_management_centerMatch6.5.0.4
OR
ciscofirepower_management_centerMatch6.5.0.5
OR
ciscofirepower_management_centerMatch6.6.0
OR
ciscofirepower_management_centerMatch6.6.0.1
OR
ciscofirepower_management_centerMatch6.6.1
OR
ciscofirepower_management_centerMatch6.6.3
OR
ciscofirepower_management_centerMatch6.6.4
OR
ciscofirepower_management_centerMatch6.6.5
OR
ciscofirepower_management_centerMatch6.6.5.1
OR
ciscofirepower_management_centerMatch6.6.5.2
OR
ciscofirepower_management_centerMatch6.6.7
OR
ciscofirepower_management_centerMatch6.7.0
OR
ciscofirepower_management_centerMatch6.7.0.1
OR
ciscofirepower_management_centerMatch6.7.0.2
OR
ciscofirepower_management_centerMatch6.7.0.3
OR
ciscofirepower_management_centerMatch7.0.0
OR
ciscofirepower_management_centerMatch7.0.0.1
OR
ciscofirepower_management_centerMatch7.0.1
OR
ciscofirepower_management_centerMatch7.0.1.1
OR
ciscofirepower_management_centerMatch7.0.2
OR
ciscofirepower_management_centerMatch7.0.2.1
OR
ciscofirepower_management_centerMatch7.0.3
OR
ciscofirepower_management_centerMatch7.0.4
OR
ciscofirepower_management_centerMatch7.1.0
OR
ciscofirepower_management_centerMatch7.1.0.1
OR
ciscofirepower_management_centerMatch7.1.0.2
OR
ciscofirepower_management_centerMatch7.2.0

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

29.4%

Related for NVD:CVE-2022-20905