Lucene search

K
vulnrichmentCiscoVULNRICHMENT:CVE-2024-20258
HistoryMay 15, 2024 - 5:32 p.m.

CVE-2024-20258

2024-05-1517:32:16
cisco
github.com
5
cisco
asyncos software
secure email
web manager
xss attack
user input validation

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.7

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.

This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:cisco:secure_email:-:*:*:*:*:*:*:*"
    ],
    "vendor": "cisco",
    "product": "secure_email",
    "versions": [
      {
        "status": "affected",
        "version": "11.0.3-238",
        "versionType": "custom",
        "lessThanOrEqual": "15.5.0-048"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:cisco:secure_email_and_web_manager:-:*:*:*:*:*:*:*"
    ],
    "vendor": "cisco",
    "product": "secure_email_and_web_manager",
    "versions": [
      {
        "status": "affected",
        "version": "9.0.0-087",
        "versionType": "custom",
        "lessThanOrEqual": "15.0.0-334"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.7

Confidence

High

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-20258