Home

Description

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information.

PUBLISHED Reserved 2023-11-08 | Published 2024-10-23 | Updated 2024-10-24 | Assigner cisco




MEDIUM: 4.8CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unknown

7.3.0
affected

7.3.1
affected

7.3.1.1
affected

7.4.0
affected

7.4.1
affected

7.4.1.1
affected

7.3.1.2
affected

References

sec.cloudapps.cisco.com/...dvisory/cisco-sa-fmc-xss-dhJxQYZs (cisco-sa-fmc-xss-dhJxQYZs)

sec.cloudapps.cisco.com/...dvisory/cisco-sa-fmc-xss-M446vbEO

sec.cloudapps.cisco.com/...enter/viewErp.x?alertId=ERP-75300 (Cisco Event Response: October 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication)

cve.org (CVE-2024-20298)

nvd.nist.gov (CVE-2024-20298)

Download JSON