Lucene search

K
nvd[email protected]NVD:CVE-2023-20218
HistoryAug 03, 2023 - 10:15 p.m.

CVE-2023-20218

2023-08-0322:15:11
CWE-79
CWE-80
web.nvd.nist.gov
1
vulnerability
cisco spa500
web-based management
user browser
insufficient validation
crafted link
malicious websites
client-side attacks
software updates

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

5.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.4%

A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user’s browser.

This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks.

Cisco will not release software updates that address this vulnerability.

{{value}} [“%7b%7bvalue%7d%7d”])}]]

Affected configurations

NVD
Node
ciscospa500ds_firmwareMatch-
AND
ciscospa500dsMatch-
Node
ciscospa500s_firmwareMatch-
AND
ciscospa500sMatch-
Node
ciscospa501g_firmwareMatch-
AND
ciscospa501gMatch-
Node
ciscospa502g_firmwareMatch-
AND
ciscospa502gMatch-
Node
ciscospa504g_firmwareMatch-
AND
ciscospa504gMatch-
Node
ciscospa508g_firmwareMatch-
AND
ciscospa508gMatch-
Node
ciscospa509g_firmwareMatch-
AND
ciscospa509gMatch-
Node
ciscospa512g_firmwareMatch-
AND
ciscospa512gMatch-
Node
ciscospa514g_firmwareMatch-
AND
ciscospa514gMatch-
Node
ciscospa525_firmwareMatch-
AND
ciscospa525Match-
Node
ciscospa525g_firmwareMatch-
AND
ciscospa525gMatch-
Node
ciscospa525g2_firmwareMatch-
AND
ciscospa525g2Match-

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

5.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.4%

Related for NVD:CVE-2023-20218