Impact
A stored cross‑site scripting vulnerability is present in the web‑based management interface of Cisco Integrated Management Controller. An administrator‑privileged attacker who has authenticated access can inject script code that is later retrieved and executed when a victim of the interface clicks a crafted link. This attack can run arbitrary code in the victim’s browser and expose sensitive, browser‑based information. The weakness is a classic improper validation of user input identified as CWE‑79.
Affected Systems
The affected products are Cisco Enterprise NFV Infrastructure Software, Cisco Unified Computing System (Standalone), and Cisco Unified Computing System E‑Series Software (UCSE). Version details are not provided in the advisory, so users should consult the vendor documentation or the provided Cisco advisory to determine the specific firmware or software releases that contain this flaw.
Risk and Exploitability
The CVSS score of 4.8 reflects a moderate impact, with the attack requiring remote authenticated administrative privileges and the successful exploitation depending on a victim clicking a malicious link. The lack of an EPSS score and absence from the KEV catalog suggest that exploit evidence is not publicly reported. Nonetheless, because the flaw permits arbitrary script execution, it poses a moderate risk, particularly in environments where privileged users access the interface using untrusted browsers or internet‑exposed connections.
OpenCVE Enrichment