A vulnerability in the web-based management interface of Cisco Prime Access Registrar could allow an authenticated, remote attacker to perform a stored cross-site scripting attack on an affected system. This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid administrative credentials. Cisco expects to release software updates that address this vulnerability.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpar-strd-xss-A4DCVETG | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2021-11-03T00:00:00
Updated: 2021-11-04T15:40:28
Reserved: 2021-06-15T00:00:00
Link: CVE-2021-34731
JSON object: View
NVD Information
Status : Modified
Published: 2021-11-04T16:15:08.500
Modified: 2023-11-07T03:36:14.230
Link: CVE-2021-34731
JSON object: View
Redhat Information
No data.
CWE