XSS in Cisco AsyncOS Web Mgmt Intf
CVE-2024-20256 Published on May 15, 2024
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Vulnerability Analysis
CVE-2024-20256 is exploitable with network access, requires user interaction and user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2024-20256 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2024-20256
Want to know whenever a new CVE is published for Cisco Asyncos? stack.watch will email you.
Affected Versions
Cisco Secure Web Appliance:- Version 11.7.0-406 is affected.
- Version 11.7.0-418 is affected.
- Version 11.7.1-049 is affected.
- Version 11.7.1-006 is affected.
- Version 11.7.1-020 is affected.
- Version 11.7.2-011 is affected.
- Version 11.8.0-414 is affected.
- Version 11.8.1-023 is affected.
- Version 11.8.3-018 is affected.
- Version 11.8.3-021 is affected.
- Version 12.0.1-268 is affected.
- Version 12.0.3-007 is affected.
- Version 12.5.2-007 is affected.
- Version 12.5.1-011 is affected.
- Version 12.5.4-005 is affected.
- Version 12.5.5-004 is affected.
- Version 12.5.6-008 is affected.
- Version 14.5.0-498 is affected.
- Version 14.5.1-016 is affected.
- Version 14.0.3-014 is affected.
- Version 14.0.2-012 is affected.
- Version 14.0.4-005 is affected.
- Version 15.0.0-322 is affected.
- Version 9.0.0-087 is affected.
- Version 11.0.0-115 is affected.
- Version 11.0.1-161 is affected.
- Version 11.5.1-105 is affected.
- Version 12.0.0-452 is affected.
- Version 12.0.1-011 is affected.
- Version 12.5.0-636 is affected.
- Version 12.5.0-658 is affected.
- Version 12.5.0-678 is affected.
- Version 12.5.0-670 is affected.
- Version 13.0.0-277 is affected.
- Version 13.6.2-078 is affected.
- Version 13.8.1-068 is affected.
- Version 13.8.1-074 is affected.
- Version 13.8.1-108 is affected.
- Version 12.8.1-002 is affected.
- Version 12.8.1-021 is affected.
- Version 14.0.0-404 is affected.
- Version 14.1.0-223 is affected.
- Version 14.1.0-227 is affected.
- Version 14.2.0-212 is affected.
- Version 14.2.0-224 is affected.
- Version 14.2.1-020 is affected.
- Version 14.3.0-120 is affected.
- Version 15.0.0-334 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.