6.1
CVE-2022-20654
- EPSS 0.04%
- Veröffentlicht 15.11.2024 16:15:20
- Zuletzt bearbeitet 07.08.2025 00:20:51
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
A vulnerability in the web-based interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based interface of Cisco Webex Meetings. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Webex Meetings Version39.6
Cisco ≫ Webex Meetings Version39.7
Cisco ≫ Webex Meetings Version39.7.4
Cisco ≫ Webex Meetings Version39.7.7
Cisco ≫ Webex Meetings Version39.8
Cisco ≫ Webex Meetings Version39.8.2
Cisco ≫ Webex Meetings Version39.8.3
Cisco ≫ Webex Meetings Version39.8.4
Cisco ≫ Webex Meetings Version39.9
Cisco ≫ Webex Meetings Version39.9.1
Cisco ≫ Webex Meetings Version39.10
Cisco ≫ Webex Meetings Version39.11
Cisco ≫ Webex Meetings Version40.1
Cisco ≫ Webex Meetings Version40.2
Cisco ≫ Webex Meetings Version40.4
Cisco ≫ Webex Meetings Version40.4.10
Cisco ≫ Webex Meetings Version40.6
Cisco ≫ Webex Meetings Version40.6.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.111 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@cisco.com | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.