CVE-2022-20635

Published on: 01/14/2022 12:00:00 AM UTC

Last Modified on: 01/14/2022 01:29:00 PM UTC

CVE-2022-20635 - advisory for cisco-sa-csm-mult-xss-7hmOKQTt

Source: Mitre Source: Nist Print: PDF PDF
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Certain versions of Cisco Security Manager from Cisco contain the following vulnerability:

Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

  • CVE-2022-20635 has been assigned by URL Logo [email protected] to track the vulnerability
  • The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
  • Affected Vendor/Software: URL Logo Cisco - Cisco Security Manager version n/a

CVE References

Description Tags Link
Cisco Security Manager Cross-Site Scripting Vulnerabilities tools.cisco.com
text/html
URL Logo CISCO 20220113 Cisco Security Manager Cross-Site Scripting Vulnerabilities

Related QID Numbers

  • 317126 Cisco Security Manager (CSM) Cross-Site Scripting Vulnerabilities (cisco-sa-csm-mult-xss-7hmOKQTt)

Known Affected Software

Vendor Product Version
Cisco Cisco_Security_Manager n/a

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2022-20635 : Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could a… twitter.com/i/web/status/1… 2022-01-14 05:15:04
Reddit Logo Icon /r/netcve CVE-2022-20635 2022-01-14 05:38:26
© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report