Impact
This vulnerability arises from insufficient input validation in the web interface of Cisco’s Integrated Management Controller (IMC). An authenticated attacker with administrative privileges can embed malicious script into the UI, which is stored and executed when a user clicks a crafted link. The stored XSS can run arbitrary JavaScript in the victim’s browser, enabling the attacker to exfiltrate credentials, manipulate the interface, or perform additional actions on behalf of the user.
Affected Systems
Affects Cisco Enterprise NFV Infrastructure Software, Cisco Unified Computing System (Standalone), and Cisco Unified Computing System E-Series Software (UCSE). Exact product versions impacted are not disclosed in the advisory.
Risk and Exploitability
With a CVSS score of 4.8, the vulnerability is of moderate severity. The EPSS score is not available, and it is not listed in CISA’s KEV catalog, indicating no confirmed public exploitation. Exploitation requires an authenticated admin account and the victim’s interaction with a crafted link, but access controls and monitoring can mitigate the risk.
OpenCVE Enrichment