XSS in Cisco Prime Access Registrar Web UI (CVE-2022-20626)
CVE-2022-20626 Published on November 15, 2024
Cisco Prime Access Registrar Appliance Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Prime Access Registrar Appliance could allow an authenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface. The attacker would require valid credentials for the device.
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Vulnerability Analysis
CVE-2022-20626 is exploitable with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2022-20626 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2022-20626
Want to know whenever a new CVE is published for Cisco Prime Access Registrar? stack.watch will email you.
Affected Versions
Cisco Prime Access Registrar:- Version 6.0.2.4 is affected.
- Version 6.0.1.2 is affected.
- Version 6.0.2.1 is affected.
- Version 6.0.1.3 is affected.
- Version 6.0 is affected.
- Version 6.0.2.2 is affected.
- Version 6.0.2 is affected.
- Version 6.0.2.3 is affected.
- Version 6.0.1.1 is affected.
- Version 8.0.2.5 is affected.
- Version 7.0 is affected.
- Version 7.1 is affected.
- Version 8.0.1.4 is affected.
- Version 9.0.0.5 is affected.
- Version 8.0.4.1 is affected.
- Version 7.0.1.4 is affected.
- Version 7.0.1.2 is affected.
- Version 8.0.2.6 is affected.
- Version 9.1.0.0 is affected.
- Version 7.0.1.9 is affected.
- Version 8.0.3 is affected.
- Version 7.1.0.1 is affected.
- Version 9.0.0.1 is affected.
- Version 8.0.3.1 is affected.
- Version 8.0.4 is affected.
- Version 7.0.1.1 is affected.
- Version 8.0.2.2 is affected.
- Version 7.0.0.1 is affected.
- Version 8.0.2.1 is affected.
- Version 7.0.1.7 is affected.
- Version 8.0.1.3 is affected.
- Version 7.0.1.6 is affected.
- Version 8.0.3.2 is affected.
- Version 8.0.1.1 is affected.
- Version 9.0 is affected.
- Version 7.0.1.11 is affected.
- Version 8.0.4.2 is affected.
- Version 9.0.0.2 is affected.
- Version 9.1.1.0 is affected.
- Version 9.0.0.3 is affected.
- Version 8.0.2.3 is affected.
- Version 7.0.1 is affected.
- Version 8.0.2 is affected.
- Version 8.0.2.4 is affected.
- Version 7.0.1.5 is affected.
- Version 8.0.2.7 is affected.
- Version 7.0.1.10 is affected.
- Version 9.0.0.4 is affected.
- Version 9.1.1.1 is affected.
- Version 8.0.1 is affected.
- Version 8.0 is affected.
- Version 8.0.1.5 is affected.
- Version 7.0.1.3 is affected.
- Version 9.2.0.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.