Description
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.

This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Published: 2024-05-15
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-17971 A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Web Appliance could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
History

Thu, 07 Aug 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco asyncos
Cisco secure Email And Web Manager M170
Cisco secure Email And Web Manager M190
Cisco secure Email And Web Manager M195
Cisco secure Email And Web Manager M380
Cisco secure Email And Web Manager M390
Cisco secure Email And Web Manager M390x
Cisco secure Email And Web Manager M395
Cisco secure Email And Web Manager M680
Cisco secure Email And Web Manager M690
Cisco secure Email And Web Manager M690x
Cisco secure Email And Web Manager M695
Cisco secure Email And Web Manager Virtual Appliance M100v
Cisco secure Email And Web Manager Virtual Appliance M300v
Cisco secure Email And Web Manager Virtual Appliance M600v
Cisco secure Web Appliance S196
Cisco secure Web Appliance S396
Cisco secure Web Appliance S696
Cisco secure Web Appliance Virtual S1000v
Cisco secure Web Appliance Virtual S100v
Cisco secure Web Appliance Virtual S300v
Cisco secure Web Appliance Virtual S600v
CPEs cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_web_appliance_virtual_s1000v:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_web_appliance_virtual_s100v:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_web_appliance_virtual_s300v:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_web_appliance_virtual_s600v:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_web_appliance_s196:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_web_appliance_s396:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:secure_web_appliance_s696:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.0.0-115:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.0.1-161:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.5.1-105:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.7.0-406:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.7.0-418:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.7.1-006:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.7.1-020:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.7.1-049:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.7.2-011:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.0.0-452:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.0.1-011:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.0-636:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.0-658:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.0-670:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.0-678:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.5.6-008:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.8.1-002:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:12.8.1-021:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:13.0.0-277:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:13.6.2-078:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:13.8.1-068:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:13.8.1-074:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:13.8.1-108:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.0.0-404:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.1.0-223:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.1.0-227:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.2.0-212:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.2.0-224:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.3.0-120:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:15.0.0-322:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:15.0.0-334:*:*:*:*:*:*:*
cpe:2.3:o:cisco:asyncos:9.0.0-087:*:*:*:*:*:*:*
Vendors & Products Cisco
Cisco asyncos
Cisco secure Email And Web Manager M170
Cisco secure Email And Web Manager M190
Cisco secure Email And Web Manager M195
Cisco secure Email And Web Manager M380
Cisco secure Email And Web Manager M390
Cisco secure Email And Web Manager M390x
Cisco secure Email And Web Manager M395
Cisco secure Email And Web Manager M680
Cisco secure Email And Web Manager M690
Cisco secure Email And Web Manager M690x
Cisco secure Email And Web Manager M695
Cisco secure Email And Web Manager Virtual Appliance M100v
Cisco secure Email And Web Manager Virtual Appliance M300v
Cisco secure Email And Web Manager Virtual Appliance M600v
Cisco secure Web Appliance S196
Cisco secure Web Appliance S396
Cisco secure Web Appliance S696
Cisco secure Web Appliance Virtual S1000v
Cisco secure Web Appliance Virtual S100v
Cisco secure Web Appliance Virtual S300v
Cisco secure Web Appliance Virtual S600v

Subscriptions

Cisco Asyncos Secure Email And Web Manager M170 Secure Email And Web Manager M190 Secure Email And Web Manager M195 Secure Email And Web Manager M380 Secure Email And Web Manager M390 Secure Email And Web Manager M390x Secure Email And Web Manager M395 Secure Email And Web Manager M680 Secure Email And Web Manager M690 Secure Email And Web Manager M690x Secure Email And Web Manager M695 Secure Email And Web Manager Virtual Appliance M100v Secure Email And Web Manager Virtual Appliance M300v Secure Email And Web Manager Virtual Appliance M600v Secure Web Appliance S196 Secure Web Appliance S396 Secure Web Appliance S696 Secure Web Appliance Virtual S1000v Secure Web Appliance Virtual S100v Secure Web Appliance Virtual S300v Secure Web Appliance Virtual S600v
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-08-15T15:29:20.282Z

Reserved: 2023-11-08T15:08:07.623Z

Link: CVE-2024-20256

cve-icon Vulnrichment

Updated: 2024-08-01T21:52:31.613Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-15T18:15:08.720

Modified: 2025-08-07T17:10:32.350

Link: CVE-2024-20256

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses