Impact
The vulnerability resides in the web‑based management interface of Cisco Integrated Management Controller (IMC) and permits a stored cross‑site scripting (XSS) attack. Due to insufficient input validation, an attacker who successfully logs in with administrative rights may store malicious script code. When an interface user opens a crafted link, the script runs in that user’s browser, potentially exposing sensitive information or enabling further exploitation within the browser context.
Affected Systems
Cisco Enterprise NFV Infrastructure Software, Cisco Unified Computing System (Standalone), and Cisco Unified Computing System E‑Series Software (UCSE) are affected. Version specifics are not disclosed, so all current releases of these products could remain vulnerable until a patch is applied.
Risk and Exploitability
The CVSS score of 4.8 reflects a moderate severity. EPSS data is unavailable and the issue is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is a remote authenticated attacker who holds administrative privileges. Once logged in, the attacker can entice a user to click a malicious link; following the click, arbitrary JavaScript runs in the user’s browser. This scenario requires the attacker to be already authenticated, but does not restrict the method of initial access beyond legitimate administrative credentials. The overall risk is elevated for environments where the IMC interface is exposed to less trusted users or over untrusted networks.
OpenCVE Enrichment