6.1
CVE-2022-20654
- EPSS 0.23%
- Veröffentlicht 15.11.2024 16:15:20
- Zuletzt bearbeitet 07.08.2025 00:20:51
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
Cisco Webex Meetings Cross-Site Scripting Vulnerability
A vulnerability in the web-based interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based interface of Cisco Webex Meetings. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Webex Meetings Version39.6
Cisco ≫ Webex Meetings Version39.7
Cisco ≫ Webex Meetings Version39.7.4
Cisco ≫ Webex Meetings Version39.7.7
Cisco ≫ Webex Meetings Version39.8
Cisco ≫ Webex Meetings Version39.8.2
Cisco ≫ Webex Meetings Version39.8.3
Cisco ≫ Webex Meetings Version39.8.4
Cisco ≫ Webex Meetings Version39.9
Cisco ≫ Webex Meetings Version39.9.1
Cisco ≫ Webex Meetings Version39.10
Cisco ≫ Webex Meetings Version39.11
Cisco ≫ Webex Meetings Version40.1
Cisco ≫ Webex Meetings Version40.2
Cisco ≫ Webex Meetings Version40.4
Cisco ≫ Webex Meetings Version40.4.10
Cisco ≫ Webex Meetings Version40.6
Cisco ≫ Webex Meetings Version40.6.2
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.23% | 0.458 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@cisco.com | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.