Unauthenticated XSS via Web UI in Cisco AsyncOS Email Gateway
CVE-2024-20258 Published on May 15, 2024
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Vulnerability Analysis
CVE-2024-20258 is exploitable with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2024-20258 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2024-20258
Want to know whenever a new CVE is published for Cisco products? stack.watch will email you.
Affected Versions
Cisco Secure Email:- Version 11.0.3-238 is affected.
- Version 11.1.0-069 is affected.
- Version 11.1.0-131 is affected.
- Version 11.1.0-128 is affected.
- Version 12.0.0-419 is affected.
- Version 12.1.0-071 is affected.
- Version 12.1.0-087 is affected.
- Version 12.1.0-089 is affected.
- Version 13.0.0-392 is affected.
- Version 13.0.5-007 is affected.
- Version 13.5.1-277 is affected.
- Version 13.5.4-038 is affected.
- Version 12.5.0-066 is affected.
- Version 12.5.4-041 is affected.
- Version 12.5.3-041 is affected.
- Version 14.0.0-698 is affected.
- Version 14.2.0-620 is affected.
- Version 14.2.1-020 is affected.
- Version 14.3.0-032 is affected.
- Version 15.0.0-104 is affected.
- Version 15.0.1-030 is affected.
- Version 15.5.0-048 is affected.
- Version 9.0.0-087 is affected.
- Version 11.0.0-115 is affected.
- Version 11.0.1-161 is affected.
- Version 11.5.1-105 is affected.
- Version 12.0.0-452 is affected.
- Version 12.0.1-011 is affected.
- Version 12.5.0-636 is affected.
- Version 12.5.0-658 is affected.
- Version 12.5.0-678 is affected.
- Version 12.5.0-670 is affected.
- Version 13.0.0-277 is affected.
- Version 13.6.2-078 is affected.
- Version 13.8.1-068 is affected.
- Version 13.8.1-074 is affected.
- Version 13.8.1-108 is affected.
- Version 12.8.1-002 is affected.
- Version 12.8.1-021 is affected.
- Version 14.0.0-404 is affected.
- Version 14.1.0-223 is affected.
- Version 14.1.0-227 is affected.
- Version 14.2.0-212 is affected.
- Version 14.2.0-224 is affected.
- Version 14.2.1-020 is affected.
- Version 14.3.0-120 is affected.
- Version 15.0.0-334 is affected.
- Version 11.0.3-238, <= 15.5.0-048 is affected.
- Version 9.0.0-087, <= 15.0.0-334 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.