4.3
CVE-2020-3345
- EPSS 0.54%
- Published 16.07.2020 18:15:17
- Last modified 21.11.2024 05:30:50
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in certain web pages of Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to modify a web page in the context of a browser. The vulnerability is due to improper checks on parameter values within affected pages. An attacker could exploit this vulnerability by persuading a user to follow a crafted link that is designed to pass HTML code into an affected parameter. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious web sites, or the attacker could leverage this vulnerability to conduct further client-side attacks.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Webex Meetings Version < 40.6.0
Cisco ≫ Webex Meetings Server Version <= 4.0
Cisco ≫ Webex Meetings Server Version4.0 Update-
Cisco ≫ Webex Meetings Server Version4.0 Updatemaintenance_release1
Cisco ≫ Webex Meetings Server Version4.0 Updatemaintenance_release2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.54% | 0.647 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
psirt@cisco.com | 4.3 | 2.8 | 1.4 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.