Impact
A flaw in the Cisco Integrated Management Controller web interface enables an authenticated, remote attacker with administrative rights to store malicious scripts that are displayed to other users. The stored cross‑site scripting can cause the victim’s browser to run arbitrary code or reveal sensitive browser‑based information. The vulnerability stems from insufficient input validation and is classified as CWE‑79. While it does not grant direct server‑side exploitation, it can enable session hijacking, credential theft, or other client‑side attacks.
Affected Systems
Affected products include Cisco Enterprise NFV Infrastructure Software, Cisco Unified Computing System (Standalone), and Cisco Unified Computing System E‑Series Software (UCSE). The data does not list specific version ranges, so all current releases of these Cisco IMC products remain potentially vulnerable until a patch is applied.
Risk and Exploitability
The CVSS score of 4.8 indicates moderate severity. No EPSS score is provided, but the exploit requires authenticated administrative access and a user to click a crafted link, limiting attacker scope to internal privileged users. The vulnerability is not listed in CISA’s KEV catalog, suggesting no known large‑scale exploitation yet. Users should promptly apply vendor updates and consider additional mitigations to reduce exposure.
OpenCVE Enrichment