Impact
The CVE describes a reflected cross‑site scripting flaw in the Cisco Integrated Management Controller web interface. An unauthenticated attacker can convince a user to click a crafted URL, causing the browser to execute arbitrary JavaScript. The result can be theft of session cookies, privilege escalation within the web application, or other malicious actions performed with the user’s credentials. This vulnerability arises from insufficient input validation, classifying it as a standard reflected XSS weakness (CWE‑79).
Affected Systems
The flaw affects Cisco’s Enterprise NFV Infrastructure Software, the standalone Cisco Unified Computing System, and the Cisco Unified Computing System E‑Series Software. No specific version numbers are supplied in the advisory, so all current releases should be examined for the presence of the issue.
Risk and Exploitability
With a CVSS score of 6.1 the risk is moderate. The exploit requires only a malicious link delivered to a user of the web console; the attacker does not need authentication. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalogue, indicating no public exploitation reports yet. Nonetheless, any user who approves the crafted link could lose control of the console session or expose sensitive information.
OpenCVE Enrichment