CVE-2022-20788
Published Apr 21, 2022
Last updated a year ago
Overview
- Description
- A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified CM Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "14033FCB-FD51-4EA3-9F9E-839D66D3E3EA", "versionEndExcluding": "11.5\\(1\\)su11", "versionStartIncluding": "11.5\\(1\\)" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*", "vulnerable": true, "matchCriteriaId": "26FE6EED-9EBD-4604-A2EF-95E063B175C2", "versionEndExcluding": "11.5\\(1\\)su11", "versionStartIncluding": "11.5\\(1\\)" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "64D27440-93CF-4806-91CB-8234DB2FB89F", "versionEndExcluding": "12.5\\(1\\)su6", "versionStartIncluding": "12.5\\(1\\)" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*", "vulnerable": true, "matchCriteriaId": "E0B2F05A-797D-48F5-9013-7E2C691DAD88", "versionEndExcluding": "12.5\\(1\\)su6", "versionStartIncluding": "12.5\\(1\\)" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "3F2FEC5B-FEA0-4766-BC68-E3391EAB2343", "versionEndExcluding": "14su1", "versionStartIncluding": "14.0" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*", "vulnerable": true, "matchCriteriaId": "5669C77B-2126-495B-B999-7D7399A280E5", "versionEndExcluding": "14su1", "versionStartIncluding": "14.0" }, { "criteria": "cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "918C4D20-C104-4692-AF23-79BBAF66916B", "versionEndExcluding": "12.5\\(1\\)su6", "versionStartIncluding": "12.5\\(1\\)" }, { "criteria": "cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39B6DB53-E770-4ABB-B186-1EDE491B24BA", "versionEndExcluding": "14su1", "versionStartIncluding": "14.0" } ], "operator": "OR" } ] } ]