A vulnerability in the web-based management interface of Cisco IOS XE Wireless Controller software for the Catalyst 9000 Family of switches could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against another user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by authenticating to the device as a high-privileged user, adding certain configurations with malicious code in one of its fields, and persuading another user to click on it. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information.
History

Sat, 09 Nov 2024 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2021-03-24T20:15:42.516181Z

Updated: 2024-11-08T23:32:06.693Z

Reserved: 2020-11-13T00:00:00

Link: CVE-2021-1374

cve-icon Vulnrichment

Updated: 2024-08-03T16:11:16.888Z

cve-icon NVD

Status : Modified

Published: 2021-03-24T21:15:12.023

Modified: 2023-11-07T03:28:08.050

Link: CVE-2021-1374

cve-icon Redhat

No data.