Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability

<p>A vulnerability in the web interface of Cisco&nbsp;Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.</p>
<p>This vulnerability is due to insufficient validation of user-supplied input that is processed by the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid <em>agent </em>credentials.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2″>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20802

Related:

  • No Related Posts

Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities

<p>Multiple vulnerabilities in the web-based management interface of Cisco&nbsp;Common Services Platform Collector (CSPC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.</p>
<p>These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.&nbsp;</p>
<p>Cisco&nbsp;has released software updates to address these vulnerabilities. There are no workarounds that address these vulnerabilities.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20666,CVE-2022-20667,CVE-2022-20668,CVE-2022-20669,CVE-2022-20670,CVE-2022-20671,CVE-2022-20672,CVE-2022-20673,CVE-2022-20674

Related:

  • No Related Posts

ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: May 2022

<p>On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed:</p>
<blockquote>
<p>A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.</p>
</blockquote>
<p>For a description of this vulnerability, see the <a href=”https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html”>ClamAV blog</a>.</p>
<p>This advisory will be updated as additional information becomes available.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-prVGcHLd” target=”_blank” rel=”noopener”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-prVGcHLd</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20770

Related:

  • No Related Posts

ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: May 2022

<p>On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed:&nbsp;</p>
<blockquote>
<p>A vulnerability in HTML file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.</p>
</blockquote>
<p>For a description of this vulnerability, see the <a href=”https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html”>ClamAV blog</a>.</p>
<p>This advisory will be updated as additional information becomes available.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-html-XAuOK8mR” target=”_blank” rel=”noopener”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-html-XAuOK8mR</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20785

Related:

  • No Related Posts

ClamAV TIFF File Parsing Denial of Service Vulnerability Affecting Cisco Products: May 2022

<p>On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed:</p>
<blockquote>
<p>A vulnerability in the TIFF file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.</p>
</blockquote>
<p>For a description of this vulnerability, see the <a href=”https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html”>ClamAV blog</a>.</p>
<p>This advisory will be updated as additional information becomes available.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-ZAZBwRVG” target=”_blank” rel=”noopener”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-ZAZBwRVG</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20771

Related:

  • No Related Posts

Cisco Enterprise NFV Infrastructure Software Vulnerabilities

<p> Multiple vulnerabilities in Cisco&nbsp;Enterprise NFV Infrastructure Software (NFVIS) could allow an attacker to escape from the guest virtual machine (VM) to the host machine, inject commands that execute at the <em>root</em> level, or leak system data from the host to the VM.</p>
<p>For more information about these vulnerabilities, see the <a href=”#details”>Details</a> section of this advisory.</p>
<p>Cisco&nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-NFVIS-MUL-7DySRX9″ target=”_blank”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-NFVIS-MUL-7DySRX9</a></p>

Security Impact Rating: Critical

CVE: CVE-2022-20777,CVE-2022-20779,CVE-2022-20780

Related:

  • No Related Posts

Cisco Small Business RV Series Routers Remote Code Execution Vulnerability

<p>A vulnerability in web-based management interface of Cisco&nbsp;Small Business RV340 and RV345 Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device.</p>
<p>This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious input to an affected device. A successful exploit could allow the attacker to execute remote code on the affected device. To exploit this vulnerability, an attacker would need to have valid <em>Administrator</em>&nbsp;credentials on the affected device.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbrv-rce-OYLQbL9u” target=”_blank”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbrv-rce-OYLQbL9u</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20753

Related:

  • No Related Posts

ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: April 2022

<p>On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed:</p>
<blockquote>
<p>A vulnerability in HTML file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.</p>
</blockquote>
<p>For a description of this vulnerability, see the <a href=”https://blog.clamav.net/”>ClamAV blog</a>.</p>
<p>This advisory will be updated as additional information becomes available.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-html-XAuOK8mR” target=”_blank”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-html-XAuOK8mR</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20785

Related:

  • No Related Posts

ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: April 2022

<p>On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed:</p>
<blockquote>
<p>A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device.</p>
</blockquote>
<p>For a description of this vulnerability, see the <a href=”https://blog.clamav.net/2022/05/clamav-01050-01043-01036-released.html”>ClamAV blog</a>.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-vL9x58p4″>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-vL9x58p4</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20796

Related:

  • No Related Posts

ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022

<p>On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed:</p>
<blockquote>
<p>A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.</p>
</blockquote>
<p>For a description of this vulnerability, see the ClamAV blog.</p>
<p>This advisory will be updated as additional information becomes available.</p>
<p>This advisory is available at the following link:<br><a href=”https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-prVGcHLd” target=”_blank”>https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-prVGcHLd</a></p>

Security Impact Rating: Medium

CVE: CVE-2022-20770

Related:

  • No Related Posts