Cisco Bug: CSCur25604 - Cisco Headend Digital Broadband Delivery System XSS Vulnerability
Jun 23, 2020
- Headend System Releases
Known Affected Releases
Symptom: A vulnerability in the web-based administration interface of the Cisco Headend Digital Broadband Delivery System could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on the affected device. The vulnerability is due to improper input validation of certain parameters passed via HTTP GET or POST methods to an affected device. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. An exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information. Cisco has confirmed the vulnerability; however, software updates are not available. To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the link. This security advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20150512-CVE-2015-0724 Conditions: Device running with default configuration running an affected version of software.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases