A vulnerability in the web-based management interface of Cisco IOS XE Wireless Controller software for the Catalyst 9000 Family of switches could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against another user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by authenticating to the device as a high-privileged user, adding certain configurations with malicious code in one of its fields, and persuading another user to click on it. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information.
Attack Vector Network
Attack Complexity Low
Privileges Required High
Scope Changed
Confidentiality Impact Low
Integrity Impact Low
Availability Impact None
User Interaction Required
No CVSS v3.0
Access Vector Network
Access Complexity Medium
Authentication Single
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
AV:N/AC:M/Au:S/C:N/I:P/A:N
Vendors | Products |
---|---|
Cisco |
|
Configuration 1 [-]
|
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-xss-cAfMtCzv | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2021-03-24T00:00:00
Updated: 2021-03-24T20:15:42
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1374
JSON object: View
NVD Information
Status : Modified
Published: 2021-03-24T21:15:12.023
Modified: 2023-11-07T03:28:08.050
Link: CVE-2021-1374
JSON object: View
Redhat Information
No data.
CWE