Cisco Prime Security Manager Cross-Site Scripting Vulnerability

Cisco-SA-20150211-CVE-2014-3365 · Medium · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

A vulnerability in multiple web interface pages of Cisco Prime Security Manager could allow an unauthenticated, remote attacker to execute cross-site scripting (XSS) attacks or hijack user sessions. The vulnerability is due to a failure to properly validate user-supplied input in the Dashboard and Configure Realm pages. An attacker could exploit this vulnerability by persuading a user to access a malicious link. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link. Cisco indicates through the CVSS score that proof-of-concept exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to contact the vendor regarding future updates and releases.

Users are advised not to visit websites or follow links that have suspicious characteristics or cannot be verified as safe.

For additional information about cross-site scripting attacks and the methods used to exploit these vulnerabilities, see the Cisco Applied Mitigation Bulletin Understanding Cross-Site Scripting (XSS) Threat Vectorshttp://www.cisco.com/en/US/products/cmb/cisco-amb-20060922-understanding-xss.html .

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2014-3365
Cisco Bug IDsCSCuo94808
CVSS ScoreBase 4.3
Base 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N/E:POC/RL:U/RC:C

Products with public affected evidence