Search criteria

24 vulnerabilities found for Cisco Enterprise Chat and Email by Cisco

CVE-2025-20310 (GCVE-0-2025-20310)

Vulnerability from cvelistv5 – Published: 2025-07-02 16:05 – Updated: 2025-07-02 17:32
VLAI?
Summary
A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 12.0(1)_ES6
Affected: 11.6(1)_ES8
Affected: 12.0(1)_ES5a
Affected: 11.6(1)_ES9
Affected: 12.0(1)_ES6_ET1
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES5
Affected: 12.5(1)_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES3_ET1
Affected: 12.0(1)_ES3
Affected: 11.6(1)_ES11
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES10
Affected: 12.0(1)_ES1
Affected: 12.0(1)
Affected: 12.5(1)_ES3
Affected: 12.6(1)
Affected: 11.5(1)
Affected: 12.0(1)_ES2
Affected: 11.6(1)_ES7
Affected: 12.5(1)_ES2
Affected: 12.6(1)_ET1
Affected: 11.6(1)
Affected: 12.5(1)_ES1
Affected: 11.5(1)_ES1_ET1
Affected: 11.6(1)_ES6_ET1
Affected: 11.6(1)_ES1
Affected: 11.6(1)_ES8_ET1
Affected: 11.5(1)_ES1
Affected: 12.6(1)_ET2
Affected: 12.5(1)_ES3_ET2
Affected: 12.0(1)_ES6_ET2
Affected: 12.6(1)_ES1
Affected: 12.5(1)_ES4
Affected: 11.6(1)_ES12
Affected: 12.6(1)_ET3
Affected: 12.5(1)_ES4_ET1
Affected: 12.0(1)_ES6_ET3
Affected: 12.6(1)_ES1_ET1
Affected: 12.6(1)_ES2
Affected: 12.6_ES2_ET1
Affected: 12.5(1)_ES5
Affected: 12.6_ES2_ET2
Affected: 12.0(1)_ES7
Affected: 12.6_ES2_ET3
Affected: 12.0(1)_ES7_ET1
Affected: 12.5(1)_ES5_ET1
Affected: 12.6_ES2_ET4
Affected: 12.6(1)_ES3
Affected: 11.6(1)_ES12_ET1
Affected: 12.6_ES3_ET1
Affected: 12.5(1)_ES6
Affected: 12.6_ES3_ET2
Affected: 12.6(1)_ES4
Affected: 12.5(1)_ES7
Affected: 12.6(1)_ES4_ET1
Affected: 12.6(1)_ES5
Affected: 12.6(1)_ES5_ET1
Affected: 12.6(1)_ES5_ET2
Affected: 12.6(1)_ES6
Affected: 12.6(1)_ES6_ET1
Affected: 12.5(1)_ES8
Affected: 12.6(1)_ES6_ET2
Affected: 12.6(1)_ES7
Affected: 12.6(1)_ES8
Affected: 12.6(1)_ES4_ET2
Affected: 12.6(1)_ES3_ET3
Affected: 12.6(1)_ES2_ET5
Affected: 12.6(1)_ES1_ET2
Affected: 12.6(1)_ES8_ET1
Affected: 12.6(1)_ES7_ET1
Affected: 12.6(1)_ES6_ET3
Affected: 12.6(1)_ES5_ET3
Affected: 12.5(1)_ES8_ET1
Affected: 12.5(1)_ES3_ET3
Affected: 12.5(1)_ES5_ET2
Affected: 12.5(1)_ES6_ET1
Affected: 12.5(1)_ES4_ET2
Affected: 12.5(1)_ES7_ET1
Affected: 12.6(1)_ES8_ET2
Affected: 12.6(1)_ES9
Affected: 12.6(1)_ES9_ET1
Affected: 12.5(1)_ES9
Affected: 12.6(1)_ES9_ET2
Affected: 12.6(1)_ES9_ET3
Affected: 12.6(1)_ES10
Affected: 12.6(1)_ES10_ET1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20310",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-02T17:28:39.761037Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-02T17:32:09.591Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            },
            {
              "status": "affected",
              "version": "11.5(1)_ES1_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "11.5(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET3"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET4"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2_ET5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES10_ET1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid\u0026nbsp;agent\u0026nbsp;credentials."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-02T16:39:49.265Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-xss-CbtKtEYc",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CbtKtEYc"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-xss-CbtKtEYc",
        "defects": [
          "CSCwo21879"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20310",
    "datePublished": "2025-07-02T16:05:43.738Z",
    "dateReserved": "2024-10-10T19:15:13.253Z",
    "dateUpdated": "2025-07-02T17:32:09.591Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20139 (GCVE-0-2025-20139)

Vulnerability from cvelistv5 – Published: 2025-04-02 16:16 – Updated: 2025-04-02 16:33
VLAI?
Summary
A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover.
CWE
  • CWE-185 - Incorrect Regular Expression
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.5(1)
Affected: 11.6(1)
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 11.6(1)_ES5
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES10
Affected: 11.6(1)_ES11
Affected: 11.6(1)_ES7
Affected: 11.6(1)_ES8
Affected: 11.6(1)_ES9
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES12
Affected: 11.6(1)_ES12_ET1
Affected: 12.0(1)
Affected: 12.0(1)_ES1
Affected: 12.0(1)_ES2
Affected: 12.0(1)_ES3
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 12.0(1)_ES5a
Affected: 12.0(1)_ES6
Affected: 12.0(1)_ES6_ET1
Affected: 12.0(1)_ES6_ET2
Affected: 12.0(1)_ES6_ET3
Affected: 12.0(1)_ES7
Affected: 12.0(1)_ES7_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES1
Affected: 12.5(1)_ES2
Affected: 12.5(1)_ES3
Affected: 12.5(1)_ES3_ET1
Affected: 12.5(1)_ET1
Affected: 12.5(1)_ES4
Affected: 12.5(1)_ES3_ET2
Affected: 12.5(1)_ES4_ET1
Affected: 12.5(1)_ES5
Affected: 12.5(1)_ES5_ET1
Affected: 12.5(1)_ES6
Affected: 12.5(1)_ES7
Affected: 12.5(1)_ES8
Affected: 12.5(1)_ES8_ET1
Affected: 12.5(1)_ES3_ET3
Affected: 12.5(1)_ES5_ET2
Affected: 12.5(1)_ES6_ET1
Affected: 12.5(1)_ES4_ET2
Affected: 12.5(1)_ES7_ET1
Affected: 12.5(1)_ES9
Affected: 12.6(1)
Affected: 12.6(1)_ET1
Affected: 12.6(1)_ET2
Affected: 12.6(1)_ES1
Affected: 12.6(1)_ET3
Affected: 12.6(1)_ES1_ET1
Affected: 12.6(1)_ES2
Affected: 12.6(1)_ES3
Affected: 12.6(1)_ES4
Affected: 12.6(1)_ES4_ET1
Affected: 12.6(1)_ES5
Affected: 12.6(1)_ES5_ET1
Affected: 12.6(1)_ES5_ET2
Affected: 12.6(1)_ES6
Affected: 12.6(1)_ES6_ET1
Affected: 12.6(1)_ES6_ET2
Affected: 12.6(1)_ES7
Affected: 12.6(1)_ES8
Affected: 12.6(1)_ES4_ET2
Affected: 12.6(1)_ES3_ET3
Affected: 12.6(1)_ES2_ET5
Affected: 12.6(1)_ES1_ET2
Affected: 12.6(1)_ES8_ET1
Affected: 12.6(1)_ES7_ET1
Affected: 12.6(1)_ES6_ET3
Affected: 12.6(1)_ES5_ET3
Affected: 12.6(1)_ES8_ET2
Affected: 12.6(1)_ES9
Affected: 12.6(1)_ES9_ET1
Affected: 12.6(1)_ES9_ET2
Affected: 12.6(1)_ES9_ET3
Affected: 12.6_ES2_ET1
Affected: 12.6_ES2_ET2
Affected: 12.6_ES2_ET3
Affected: 12.6_ES2_ET4
Affected: 12.6_ES3_ET1
Affected: 12.6_ES3_ET2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20139",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-02T16:33:38.164036Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-02T16:33:45.699Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2_ET5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET3"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET2"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET3"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET4"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-185",
              "description": "Incorrect Regular Expression",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-02T16:16:17.546Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-dos-tC6m9GZ8",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-dos-tC6m9GZ8",
        "defects": [
          "CSCwm08282"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20139",
    "datePublished": "2025-04-02T16:16:17.546Z",
    "dateReserved": "2024-10-10T19:15:13.213Z",
    "dateUpdated": "2025-04-02T16:33:45.699Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20633 (GCVE-0-2022-20633)

Vulnerability from cvelistv5 – Published: 2024-11-15 16:15 – Updated: 2024-11-15 21:35
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to perform a username enumeration attack against an affected device. This vulnerability is due to differences in authentication responses that are sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to an affected device. A successful exploit could allow the attacker to confirm existing user accounts, which could be used in further attacks. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-204 - Observable Response Discrepancy
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 12.0(1)_ES6
Affected: 11.6(1)_ES8
Affected: 12.0(1)_ES5a
Affected: 11.6(1)_ES9
Affected: 12.0(1)_ES6_ET1
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES5
Affected: 12.5(1)_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES3_ET1
Affected: 12.0(1)_ES3
Affected: 11.6(1)_ES11
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES10
Affected: 12.0(1)_ES1
Affected: 12.0(1)
Affected: 12.5(1)_ES3
Affected: 12.6(1)
Affected: 11.5(1)
Affected: 12.0(1)_ES2
Affected: 11.6(1)_ES7
Affected: 12.5(1)_ES2
Affected: 12.6(1)_ET1
Affected: 11.6(1)
Affected: 12.5(1)_ES1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "enterprise_chat_and_email",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "12.6(1)_ES1",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20633",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T18:00:16.076880Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T21:35:35.232Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;ECE could allow an unauthenticated, remote attacker to perform a username enumeration attack against an affected device.\r\n\r\nThis vulnerability is due to differences in authentication responses that are sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to an affected device. A successful exploit could allow the attacker to confirm existing user accounts, which could be used in further attacks.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-204",
              "description": "Observable Response Discrepancy",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T16:15:01.284Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-multivulns-kbK2yVhR",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-multivulns-kbK2yVhR",
        "defects": [
          "CSCvz20450"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Username Enumeration Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20633",
    "datePublished": "2024-11-15T16:15:01.284Z",
    "dateReserved": "2021-11-02T13:28:29.030Z",
    "dateUpdated": "2024-11-15T21:35:35.232Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20632 (GCVE-0-2022-20632)

Vulnerability from cvelistv5 – Published: 2024-11-15 16:14 – Updated: 2024-11-15 18:00
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 12.0(1)_ES6
Affected: 11.6(1)_ES8
Affected: 12.0(1)_ES5a
Affected: 11.6(1)_ES9
Affected: 12.0(1)_ES6_ET1
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES5
Affected: 12.5(1)_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES3_ET1
Affected: 12.0(1)_ES3
Affected: 11.6(1)_ES11
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES10
Affected: 12.0(1)_ES1
Affected: 12.0(1)
Affected: 12.5(1)_ES3
Affected: 12.6(1)
Affected: 11.5(1)
Affected: 12.0(1)_ES2
Affected: 11.6(1)_ES7
Affected: 12.5(1)_ES2
Affected: 12.6(1)_ET1
Affected: 11.6(1)
Affected: 12.5(1)_ES1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20632",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T18:00:39.476767Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T18:00:56.895Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device.\r\nThe vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T16:14:53.322Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-multivulns-kbK2yVhR",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-multivulns-kbK2yVhR",
        "defects": [
          "CSCvz20436"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20632",
    "datePublished": "2024-11-15T16:14:53.322Z",
    "dateReserved": "2021-11-02T13:28:29.030Z",
    "dateUpdated": "2024-11-15T18:00:56.895Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20631 (GCVE-0-2022-20631)

Vulnerability from cvelistv5 – Published: 2024-11-15 16:03 – Updated: 2024-11-15 16:25
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious script code in a chat window. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 12.0(1)_ES6
Affected: 11.6(1)_ES8
Affected: 12.0(1)_ES5a
Affected: 11.6(1)_ES9
Affected: 12.0(1)_ES6_ET1
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES5
Affected: 12.5(1)_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES3_ET1
Affected: 12.0(1)_ES3
Affected: 11.6(1)_ES11
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES10
Affected: 12.0(1)_ES1
Affected: 12.0(1)
Affected: 12.5(1)_ES3
Affected: 12.6(1)
Affected: 11.5(1)
Affected: 12.0(1)_ES2
Affected: 11.6(1)_ES7
Affected: 12.5(1)_ES2
Affected: 12.6(1)_ET1
Affected: 11.6(1)
Affected: 12.5(1)_ES1
Affected: 11.5(1)_ES1_ET1
Affected: 11.6(1)_ES1
Affected: 11.6(1)_ES8_ET1
Affected: 11.5(1)_ES1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20631",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:25:48.751392Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T16:25:56.777Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            },
            {
              "status": "affected",
              "version": "11.5(1)_ES1_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "11.5(1)_ES1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device.\r\nThe vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious script code in a chat window. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T16:03:36.564Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-multivulns-kbK2yVhR",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-multivulns-kbK2yVhR",
        "defects": [
          "CSCvz20427"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20631",
    "datePublished": "2024-11-15T16:03:36.564Z",
    "dateReserved": "2021-11-02T13:28:29.029Z",
    "dateUpdated": "2024-11-15T16:25:56.777Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20634 (GCVE-0-2022-20634)

Vulnerability from cvelistv5 – Published: 2024-11-15 16:02 – Updated: 2024-11-15 16:28
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to redirect a user to an undesired web page. This vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect and is used in phishing attacks that get users to unknowingly visit malicious sites.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 12.0(1)_ES6
Affected: 11.6(1)_ES8
Affected: 12.0(1)_ES5a
Affected: 11.6(1)_ES9
Affected: 12.0(1)_ES6_ET1
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES5
Affected: 12.5(1)_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES3_ET1
Affected: 12.0(1)_ES3
Affected: 11.6(1)_ES11
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES10
Affected: 12.0(1)_ES1
Affected: 12.0(1)
Affected: 12.5(1)_ES3
Affected: 12.6(1)
Affected: 11.5(1)
Affected: 12.0(1)_ES2
Affected: 11.6(1)_ES7
Affected: 12.5(1)_ES2
Affected: 12.6(1)_ET1
Affected: 11.6(1)
Affected: 12.5(1)_ES1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20634",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:27:50.770905Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T16:28:24.431Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;ECE could allow an unauthenticated, remote attacker to redirect a user to an undesired web page.\r\nThis vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect and is used in phishing attacks that get users to unknowingly visit malicious sites.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-601",
              "description": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T16:02:16.937Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-multivulns-kbK2yVhR",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-multivulns-kbK2yVhR",
        "defects": [
          "CSCvz50629"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Open Redirect Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20634",
    "datePublished": "2024-11-15T16:02:16.937Z",
    "dateReserved": "2021-11-02T13:28:29.030Z",
    "dateUpdated": "2024-11-15T16:28:24.431Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20484 (GCVE-0-2024-20484)

Vulnerability from cvelistv5 – Published: 2024-11-06 16:29 – Updated: 2024-11-06 17:20
VLAI?
Summary
A vulnerability in the External Agent Assignment Service (EAAS) feature of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of Media Routing Peripheral Interface Manager (MR PIM) traffic that is received by an affected device. An attacker could exploit this vulnerability by sending crafted MR PIM traffic to an affected device. A successful exploit could allow the attacker to trigger a failure on the MR PIM connection between Cisco ECE and Cisco Unified Contact Center Enterprise (CCE), leading to a DoS condition on EAAS that would prevent customers from starting chat, callback, or delayed callback sessions. Note: When the attack traffic stops, the EAAS process must be manually restarted to restore normal operation. To restart the process in the System Console, choose Shared Resources > Services > Unified CCE > EAAS, then click Start.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 12.0(1)_ES6
Affected: 11.6(1)_ES9
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES5
Affected: 12.5(1)_ET1
Affected: 12.5(1)_ES3_ET1
Affected: 12.0(1)_ES3
Affected: 11.6(1)_ES11
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES10
Affected: 12.0(1)_ES1
Affected: 12.0(1)
Affected: 12.5(1)_ES3
Affected: 12.6(1)
Affected: 11.5(1)
Affected: 12.0(1)_ES2
Affected: 11.6(1)_ES7
Affected: 12.6(1)_ET1
Affected: 11.6(1)
Affected: 12.6(1)_ET2
Affected: 12.5(1)_ES3_ET2
Affected: 12.0(1)_ES6_ET2
Affected: 12.6(1)_ES1
Affected: 11.6(1)_ES12
Affected: 12.6(1)_ET3
Affected: 12.5(1)_ES4_ET1
Affected: 12.0(1)_ES6_ET3
Affected: 12.6(1)_ES1_ET1
Affected: 12.6(1)_ES2
Affected: 12.6_ES2_ET1
Affected: 12.5(1)_ES5
Affected: 12.6_ES2_ET2
Affected: 12.0(1)_ES7
Affected: 12.6_ES2_ET3
Affected: 12.0(1)_ES7_ET1
Affected: 12.5(1)_ES5_ET1
Affected: 12.6_ES2_ET4
Affected: 12.6(1)_ES3
Affected: 11.6(1)_ES12_ET1
Affected: 12.6_ES3_ET1
Affected: 12.6_ES3_ET2
Affected: 12.6(1)_ES4
Affected: 12.5(1)_ES7
Affected: 12.6(1)_ES4_ET1
Affected: 12.6(1)_ES5
Affected: 12.6(1)_ES5_ET1
Affected: 12.6(1)_ES5_ET2
Affected: 12.6(1)_ES6
Affected: 12.6(1)_ES6_ET1
Affected: 12.5(1)_ES8
Affected: 12.6(1)_ES6_ET2
Affected: 12.6(1)_ES7
Affected: 12.6(1)_ES8
Affected: 12.6(1)_ES4_ET2
Affected: 12.6(1)_ES3_ET3
Affected: 12.6(1)_ES2_ET5
Affected: 12.6(1)_ES1_ET2
Affected: 12.6(1)_ES8_ET1
Affected: 12.6(1)_ES7_ET1
Affected: 12.6(1)_ES6_ET3
Affected: 12.6(1)_ES5_ET3
Affected: 12.5(1)_ES8_ET1
Affected: 12.5(1)_ES3_ET3
Affected: 12.5(1)_ES5_ET2
Affected: 12.5(1)_ES6_ET1
Affected: 12.5(1)_ES4_ET2
Affected: 12.5(1)_ES7_ET1
Affected: 12.6(1)_ES8_ET2
Affected: 12.6(1)_ES9
Affected: 12.6(1)_ES9_ET1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "enterprise_chat_and_email",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "11.6(1)_ES3"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES4"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES6"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES9"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES6"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES5"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ET1"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES3_ET1"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES3"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES11"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES4"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES5"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES2"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES9a"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES10"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES1"
              },
              {
                "status": "affected",
                "version": "12.0(1)"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES3"
              },
              {
                "status": "affected",
                "version": "12.6(1)"
              },
              {
                "status": "affected",
                "version": "11.5(1)"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES2"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES7"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ET1"
              },
              {
                "status": "affected",
                "version": "11.6(1)"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ET2"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES3_ET2"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES6_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES1"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES12"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ET3"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES4_ET1"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES6_ET3"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES1_ET1"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES2"
              },
              {
                "status": "affected",
                "version": "12.6_ES2_ET1"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES5"
              },
              {
                "status": "affected",
                "version": "12.6_ES2_ET2"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES7"
              },
              {
                "status": "affected",
                "version": "12.6_ES2_ET3"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES7_ET1"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES5_ET1"
              },
              {
                "status": "affected",
                "version": "12.6_ES2_ET4"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES3"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES12_ET1"
              },
              {
                "status": "affected",
                "version": "12.6_ES3_ET1"
              },
              {
                "status": "affected",
                "version": "12.6_ES3_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES4"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES7"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES4_ET1"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES5"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES5_ET1"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES5_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES6"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES6_ET1"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES8"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES6_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES7"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES8"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES4_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES3_ET3"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES2_ET5"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES1_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES8_ET1"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES7_ET1"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES6_ET3"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES5_ET3"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES8_ET1"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES3_ET3"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES5_ET2"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES6_ET1"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES4_ET2"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES7_ET1"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES8_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES9"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES9_ET1"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20484",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-06T17:20:15.324243Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-06T17:20:30.979Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET3"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET4"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2_ET5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the External Agent Assignment Service (EAAS) feature of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of Media Routing Peripheral Interface Manager (MR PIM) traffic that is received by an affected device. An attacker could exploit this vulnerability by sending crafted MR PIM traffic to an affected device. A successful exploit could allow the attacker to trigger a failure on the MR PIM connection between Cisco ECE and Cisco Unified Contact Center Enterprise (CCE), leading to a DoS condition on EAAS that would prevent customers from starting chat, callback, or delayed callback sessions. Note: When the attack traffic stops, the EAAS process must be manually restarted to restore normal operation. To restart the process in the System Console, choose Shared Resources \u0026gt; Services \u0026gt; Unified CCE \u0026gt; EAAS, then click Start."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "Improper Input Validation",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-06T16:29:20.865Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-dos-Oqb9uFEv",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-Oqb9uFEv"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-dos-Oqb9uFEv",
        "defects": [
          "CSCwj26667"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Denial of Service Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20484",
    "datePublished": "2024-11-06T16:29:20.865Z",
    "dateReserved": "2023-11-08T15:08:07.684Z",
    "dateUpdated": "2024-11-06T17:20:30.979Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20367 (GCVE-0-2024-20367)

Vulnerability from cvelistv5 – Published: 2024-04-03 16:22 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.5(1)
Affected: 11.6(1)
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 11.6(1)_ES5
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES10
Affected: 11.6(1)_ES11
Affected: 11.6(1)_ES7
Affected: 11.6(1)_ES8
Affected: 11.6(1)_ES9
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES12
Affected: 12.0(1)
Affected: 12.0(1)_ES1
Affected: 12.0(1)_ES2
Affected: 12.0(1)_ES3
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 12.0(1)_ES5a
Affected: 12.0(1)_ES6
Affected: 12.0(1)_ES6_ET1
Affected: 12.0(1)_ES6_ET2
Affected: 12.0(1)_ES6_ET3
Affected: 12.0(1)_ES7
Affected: 12.0(1)_ES7_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES1
Affected: 12.5(1)_ES2
Affected: 12.5(1)_ES3
Affected: 12.5(1)_ES3_ET1
Affected: 12.5(1)_ET1
Affected: 12.5(1)_ES4
Affected: 12.5(1)_ES3_ET2
Affected: 12.5(1)_ES4_ET1
Affected: 12.5(1)_ES5
Affected: 12.5(1)_ES5_ET1
Affected: 12.5(1)_ES6
Affected: 12.5(1)_ES7
Affected: 12.5(1)_ES8
Affected: 12.6(1)
Affected: 12.6(1)_ET1
Affected: 12.6(1)_ET2
Affected: 12.6(1)_ES1
Affected: 12.6(1)_ET3
Affected: 12.6(1)_ES1_ET1
Affected: 12.6(1)_ES2
Affected: 12.6(1)_ES3
Affected: 12.6(1)_ES4
Affected: 12.6(1)_ES4_ET1
Affected: 12.6(1)_ES5
Affected: 12.6(1)_ES5_ET1
Affected: 12.6(1)_ES5_ET2
Affected: 12.6(1)_ES6
Affected: 12.6(1)_ES6_ET1
Affected: 12.6(1)_ES6_ET2
Affected: 12.6_ES2_ET1
Affected: 12.6_ES2_ET2
Affected: 12.6_ES2_ET3
Affected: 12.6_ES2_ET4
Affected: 12.6_ES3_ET1
Affected: 12.6_ES3_ET2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20367",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-03T19:09:37.153152Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:40:29.581Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:42.019Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-ece-xss-CSQxgxfM",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CSQxgxfM"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET2"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET3"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET4"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r This vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-03T16:22:22.902Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-xss-CSQxgxfM",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CSQxgxfM"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-xss-CSQxgxfM",
        "defects": [
          "CSCwi28527"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20367",
    "datePublished": "2024-04-03T16:22:22.902Z",
    "dateReserved": "2023-11-08T15:08:07.653Z",
    "dateUpdated": "2024-08-01T21:59:42.019Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20802 (GCVE-0-2022-20802)

Vulnerability from cvelistv5 – Published: 2022-05-27 14:06 – Updated: 2024-11-06 16:13
VLAI?
Summary
A vulnerability in the web interface of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input that is processed by the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:24:49.859Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20220518 Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20802",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-06T15:58:10.731668Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-06T16:13:05.071Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2022-05-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web interface of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input that is processed by the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-27T14:06:33",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20220518 Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-strd-xss-BqFXO9D2",
        "defect": [
          [
            "CSCwa92119"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2022-05-18T23:00:00",
          "ID": "CVE-2022-20802",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Enterprise Chat and Email",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web interface of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input that is processed by the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "5.4",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20220518 Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-ece-strd-xss-BqFXO9D2",
          "defect": [
            [
              "CSCwa92119"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20802",
    "datePublished": "2022-05-27T14:06:34.048404Z",
    "dateReserved": "2021-11-02T00:00:00",
    "dateUpdated": "2024-11-06T16:13:05.071Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1877 (GCVE-0-2019-1877)

Vulnerability from cvelistv5 – Published: 2019-11-05 19:25 – Updated: 2024-11-21 19:05
VLAI?
Summary
A vulnerability in the HTTP API of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to download files attached through chat sessions. The vulnerability is due to insufficient authentication mechanisms on the file download function of the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to download files that other users attach through the chat feature. This vulnerability affects versions prior to 12.0(1)ES1.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: unspecified , < 12.0(1)ES1 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:42.955Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190619 Cisco Enterprise Chat and Email Attachment Download Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-ecea-dwnload"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1877",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-21T18:55:51.330414Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T19:05:56.918Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "12.0(1)ES1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-06-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the HTTP API of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to download files attached through chat sessions. The vulnerability is due to insufficient authentication mechanisms on the file download function of the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to download files that other users attach through the chat feature. This vulnerability affects versions prior to 12.0(1)ES1."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-05T19:25:36",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190619 Cisco Enterprise Chat and Email Attachment Download Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-ecea-dwnload"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190619-ecea-dwnload",
        "defect": [
          [
            "CSCvo99235"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Attachment Download Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-06-19T16:00:00-0700",
          "ID": "CVE-2019-1877",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Enterprise Chat and Email Attachment Download Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Enterprise Chat and Email",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "12.0(1)ES1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the HTTP API of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to download files attached through chat sessions. The vulnerability is due to insufficient authentication mechanisms on the file download function of the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to download files that other users attach through the chat feature. This vulnerability affects versions prior to 12.0(1)ES1."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "6.5",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190619 Cisco Enterprise Chat and Email Attachment Download Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-ecea-dwnload"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190619-ecea-dwnload",
          "defect": [
            [
              "CSCvo99235"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1877",
    "datePublished": "2019-11-05T19:25:36.092873Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-21T19:05:56.918Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1870 (GCVE-0-2019-1870)

Vulnerability from cvelistv5 – Published: 2019-06-05 16:30 – Updated: 2024-11-21 19:22
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco Enterprise Chat and Email (ECE) Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface or allow the attacker to access sensitive browser-based information.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/108645 vdb-entryx_refsource_BID
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: unspecified , < 11.6(1) (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:42.879Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190605 Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ece-xss"
          },
          {
            "name": "108645",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/108645"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1870",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-21T18:58:13.778975Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T19:22:37.120Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "11.6(1)",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-06-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Enterprise Chat and Email (ECE) Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface or allow the attacker to access sensitive browser-based information."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-06T14:06:04",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190605 Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ece-xss"
        },
        {
          "name": "108645",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/108645"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190605-ece-xss",
        "defect": [
          [
            "CSCvo85826"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-06-05T16:00:00-0700",
          "ID": "CVE-2019-1870",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Enterprise Chat and Email",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "11.6(1)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web-based management interface of Cisco Enterprise Chat and Email (ECE) Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface or allow the attacker to access sensitive browser-based information."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "6.1",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190605 Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ece-xss"
            },
            {
              "name": "108645",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/108645"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190605-ece-xss",
          "defect": [
            [
              "CSCvo85826"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1870",
    "datePublished": "2019-06-05T16:30:38.980162Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-21T19:22:37.120Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1702 (GCVE-0-2019-1702)

Vulnerability from cvelistv5 – Published: 2019-03-11 22:00 – Updated: 2024-11-21 19:42
VLAI?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit these vulnerabilities either by injecting malicious code in a chat window or by sending a crafted link to a user of the interface. In both cases, the attacker must persuade the user to click the crafted link or open the chat window that contains the attacker's code. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Version 11.6(1) is affected.
CWE
Assigner
References
http://www.securityfocus.com/bid/107314 vdb-entryx_refsource_BID
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:41.984Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "107314",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/107314"
          },
          {
            "name": "20190306 Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-chatmail-xss"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1702",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-21T18:59:58.305225Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T19:42:32.507Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)"
            }
          ]
        }
      ],
      "datePublic": "2019-03-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple vulnerabilities in the web-based management interface of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit these vulnerabilities either by injecting malicious code in a chat window or by sending a crafted link to a user of the interface. In both cases, the attacker must persuade the user to click the crafted link or open the chat window that contains the attacker\u0027s code. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Version 11.6(1) is affected."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-03-12T09:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "107314",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/107314"
        },
        {
          "name": "20190306 Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-chatmail-xss"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190306-chatmail-xss",
        "defect": [
          [
            "CSCvn77926",
            "CSCvn77927"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerabilities",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-03-06T16:00:00-0800",
          "ID": "CVE-2019-1702",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerabilities"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Enterprise Chat and Email",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "11.6(1)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple vulnerabilities in the web-based management interface of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit these vulnerabilities either by injecting malicious code in a chat window or by sending a crafted link to a user of the interface. In both cases, the attacker must persuade the user to click the crafted link or open the chat window that contains the attacker\u0027s code. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Version 11.6(1) is affected."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "6.1",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "107314",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/107314"
            },
            {
              "name": "20190306 Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerabilities",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-chatmail-xss"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190306-chatmail-xss",
          "defect": [
            [
              "CSCvn77926",
              "CSCvn77927"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1702",
    "datePublished": "2019-03-11T22:00:00Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-21T19:42:32.507Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20310 (GCVE-0-2025-20310)

Vulnerability from nvd – Published: 2025-07-02 16:05 – Updated: 2025-07-02 17:32
VLAI?
Summary
A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid&nbsp;agent&nbsp;credentials.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 12.0(1)_ES6
Affected: 11.6(1)_ES8
Affected: 12.0(1)_ES5a
Affected: 11.6(1)_ES9
Affected: 12.0(1)_ES6_ET1
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES5
Affected: 12.5(1)_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES3_ET1
Affected: 12.0(1)_ES3
Affected: 11.6(1)_ES11
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES10
Affected: 12.0(1)_ES1
Affected: 12.0(1)
Affected: 12.5(1)_ES3
Affected: 12.6(1)
Affected: 11.5(1)
Affected: 12.0(1)_ES2
Affected: 11.6(1)_ES7
Affected: 12.5(1)_ES2
Affected: 12.6(1)_ET1
Affected: 11.6(1)
Affected: 12.5(1)_ES1
Affected: 11.5(1)_ES1_ET1
Affected: 11.6(1)_ES6_ET1
Affected: 11.6(1)_ES1
Affected: 11.6(1)_ES8_ET1
Affected: 11.5(1)_ES1
Affected: 12.6(1)_ET2
Affected: 12.5(1)_ES3_ET2
Affected: 12.0(1)_ES6_ET2
Affected: 12.6(1)_ES1
Affected: 12.5(1)_ES4
Affected: 11.6(1)_ES12
Affected: 12.6(1)_ET3
Affected: 12.5(1)_ES4_ET1
Affected: 12.0(1)_ES6_ET3
Affected: 12.6(1)_ES1_ET1
Affected: 12.6(1)_ES2
Affected: 12.6_ES2_ET1
Affected: 12.5(1)_ES5
Affected: 12.6_ES2_ET2
Affected: 12.0(1)_ES7
Affected: 12.6_ES2_ET3
Affected: 12.0(1)_ES7_ET1
Affected: 12.5(1)_ES5_ET1
Affected: 12.6_ES2_ET4
Affected: 12.6(1)_ES3
Affected: 11.6(1)_ES12_ET1
Affected: 12.6_ES3_ET1
Affected: 12.5(1)_ES6
Affected: 12.6_ES3_ET2
Affected: 12.6(1)_ES4
Affected: 12.5(1)_ES7
Affected: 12.6(1)_ES4_ET1
Affected: 12.6(1)_ES5
Affected: 12.6(1)_ES5_ET1
Affected: 12.6(1)_ES5_ET2
Affected: 12.6(1)_ES6
Affected: 12.6(1)_ES6_ET1
Affected: 12.5(1)_ES8
Affected: 12.6(1)_ES6_ET2
Affected: 12.6(1)_ES7
Affected: 12.6(1)_ES8
Affected: 12.6(1)_ES4_ET2
Affected: 12.6(1)_ES3_ET3
Affected: 12.6(1)_ES2_ET5
Affected: 12.6(1)_ES1_ET2
Affected: 12.6(1)_ES8_ET1
Affected: 12.6(1)_ES7_ET1
Affected: 12.6(1)_ES6_ET3
Affected: 12.6(1)_ES5_ET3
Affected: 12.5(1)_ES8_ET1
Affected: 12.5(1)_ES3_ET3
Affected: 12.5(1)_ES5_ET2
Affected: 12.5(1)_ES6_ET1
Affected: 12.5(1)_ES4_ET2
Affected: 12.5(1)_ES7_ET1
Affected: 12.6(1)_ES8_ET2
Affected: 12.6(1)_ES9
Affected: 12.6(1)_ES9_ET1
Affected: 12.5(1)_ES9
Affected: 12.6(1)_ES9_ET2
Affected: 12.6(1)_ES9_ET3
Affected: 12.6(1)_ES10
Affected: 12.6(1)_ES10_ET1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20310",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-02T17:28:39.761037Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-02T17:32:09.591Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            },
            {
              "status": "affected",
              "version": "11.5(1)_ES1_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "11.5(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET3"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET4"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2_ET5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES10_ET1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid\u0026nbsp;agent\u0026nbsp;credentials."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-02T16:39:49.265Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-xss-CbtKtEYc",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CbtKtEYc"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-xss-CbtKtEYc",
        "defects": [
          "CSCwo21879"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20310",
    "datePublished": "2025-07-02T16:05:43.738Z",
    "dateReserved": "2024-10-10T19:15:13.253Z",
    "dateUpdated": "2025-07-02T17:32:09.591Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20139 (GCVE-0-2025-20139)

Vulnerability from nvd – Published: 2025-04-02 16:16 – Updated: 2025-04-02 16:33
VLAI?
Summary
A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover.
CWE
  • CWE-185 - Incorrect Regular Expression
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.5(1)
Affected: 11.6(1)
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 11.6(1)_ES5
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES10
Affected: 11.6(1)_ES11
Affected: 11.6(1)_ES7
Affected: 11.6(1)_ES8
Affected: 11.6(1)_ES9
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES12
Affected: 11.6(1)_ES12_ET1
Affected: 12.0(1)
Affected: 12.0(1)_ES1
Affected: 12.0(1)_ES2
Affected: 12.0(1)_ES3
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 12.0(1)_ES5a
Affected: 12.0(1)_ES6
Affected: 12.0(1)_ES6_ET1
Affected: 12.0(1)_ES6_ET2
Affected: 12.0(1)_ES6_ET3
Affected: 12.0(1)_ES7
Affected: 12.0(1)_ES7_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES1
Affected: 12.5(1)_ES2
Affected: 12.5(1)_ES3
Affected: 12.5(1)_ES3_ET1
Affected: 12.5(1)_ET1
Affected: 12.5(1)_ES4
Affected: 12.5(1)_ES3_ET2
Affected: 12.5(1)_ES4_ET1
Affected: 12.5(1)_ES5
Affected: 12.5(1)_ES5_ET1
Affected: 12.5(1)_ES6
Affected: 12.5(1)_ES7
Affected: 12.5(1)_ES8
Affected: 12.5(1)_ES8_ET1
Affected: 12.5(1)_ES3_ET3
Affected: 12.5(1)_ES5_ET2
Affected: 12.5(1)_ES6_ET1
Affected: 12.5(1)_ES4_ET2
Affected: 12.5(1)_ES7_ET1
Affected: 12.5(1)_ES9
Affected: 12.6(1)
Affected: 12.6(1)_ET1
Affected: 12.6(1)_ET2
Affected: 12.6(1)_ES1
Affected: 12.6(1)_ET3
Affected: 12.6(1)_ES1_ET1
Affected: 12.6(1)_ES2
Affected: 12.6(1)_ES3
Affected: 12.6(1)_ES4
Affected: 12.6(1)_ES4_ET1
Affected: 12.6(1)_ES5
Affected: 12.6(1)_ES5_ET1
Affected: 12.6(1)_ES5_ET2
Affected: 12.6(1)_ES6
Affected: 12.6(1)_ES6_ET1
Affected: 12.6(1)_ES6_ET2
Affected: 12.6(1)_ES7
Affected: 12.6(1)_ES8
Affected: 12.6(1)_ES4_ET2
Affected: 12.6(1)_ES3_ET3
Affected: 12.6(1)_ES2_ET5
Affected: 12.6(1)_ES1_ET2
Affected: 12.6(1)_ES8_ET1
Affected: 12.6(1)_ES7_ET1
Affected: 12.6(1)_ES6_ET3
Affected: 12.6(1)_ES5_ET3
Affected: 12.6(1)_ES8_ET2
Affected: 12.6(1)_ES9
Affected: 12.6(1)_ES9_ET1
Affected: 12.6(1)_ES9_ET2
Affected: 12.6(1)_ES9_ET3
Affected: 12.6_ES2_ET1
Affected: 12.6_ES2_ET2
Affected: 12.6_ES2_ET3
Affected: 12.6_ES2_ET4
Affected: 12.6_ES3_ET1
Affected: 12.6_ES3_ET2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20139",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-02T16:33:38.164036Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-02T16:33:45.699Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2_ET5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET3"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET2"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET3"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET4"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-185",
              "description": "Incorrect Regular Expression",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-02T16:16:17.546Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-dos-tC6m9GZ8",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-dos-tC6m9GZ8",
        "defects": [
          "CSCwm08282"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20139",
    "datePublished": "2025-04-02T16:16:17.546Z",
    "dateReserved": "2024-10-10T19:15:13.213Z",
    "dateUpdated": "2025-04-02T16:33:45.699Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20633 (GCVE-0-2022-20633)

Vulnerability from nvd – Published: 2024-11-15 16:15 – Updated: 2024-11-15 21:35
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco&nbsp;ECE could allow an unauthenticated, remote attacker to perform a username enumeration attack against an affected device. This vulnerability is due to differences in authentication responses that are sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to an affected device. A successful exploit could allow the attacker to confirm existing user accounts, which could be used in further attacks. Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-204 - Observable Response Discrepancy
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 12.0(1)_ES6
Affected: 11.6(1)_ES8
Affected: 12.0(1)_ES5a
Affected: 11.6(1)_ES9
Affected: 12.0(1)_ES6_ET1
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES5
Affected: 12.5(1)_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES3_ET1
Affected: 12.0(1)_ES3
Affected: 11.6(1)_ES11
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES10
Affected: 12.0(1)_ES1
Affected: 12.0(1)
Affected: 12.5(1)_ES3
Affected: 12.6(1)
Affected: 11.5(1)
Affected: 12.0(1)_ES2
Affected: 11.6(1)_ES7
Affected: 12.5(1)_ES2
Affected: 12.6(1)_ET1
Affected: 11.6(1)
Affected: 12.5(1)_ES1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "enterprise_chat_and_email",
            "vendor": "cisco",
            "versions": [
              {
                "lessThan": "12.6(1)_ES1",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20633",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T18:00:16.076880Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T21:35:35.232Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;ECE could allow an unauthenticated, remote attacker to perform a username enumeration attack against an affected device.\r\n\r\nThis vulnerability is due to differences in authentication responses that are sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to an affected device. A successful exploit could allow the attacker to confirm existing user accounts, which could be used in further attacks.\r\nCisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-204",
              "description": "Observable Response Discrepancy",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T16:15:01.284Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-multivulns-kbK2yVhR",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-multivulns-kbK2yVhR",
        "defects": [
          "CSCvz20450"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Username Enumeration Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20633",
    "datePublished": "2024-11-15T16:15:01.284Z",
    "dateReserved": "2021-11-02T13:28:29.030Z",
    "dateUpdated": "2024-11-15T21:35:35.232Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20632 (GCVE-0-2022-20632)

Vulnerability from nvd – Published: 2024-11-15 16:14 – Updated: 2024-11-15 18:00
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco&nbsp;ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 12.0(1)_ES6
Affected: 11.6(1)_ES8
Affected: 12.0(1)_ES5a
Affected: 11.6(1)_ES9
Affected: 12.0(1)_ES6_ET1
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES5
Affected: 12.5(1)_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES3_ET1
Affected: 12.0(1)_ES3
Affected: 11.6(1)_ES11
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES10
Affected: 12.0(1)_ES1
Affected: 12.0(1)
Affected: 12.5(1)_ES3
Affected: 12.6(1)
Affected: 11.5(1)
Affected: 12.0(1)_ES2
Affected: 11.6(1)_ES7
Affected: 12.5(1)_ES2
Affected: 12.6(1)_ET1
Affected: 11.6(1)
Affected: 12.5(1)_ES1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20632",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T18:00:39.476767Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T18:00:56.895Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device.\r\nThe vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco\u00a0PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T16:14:53.322Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-multivulns-kbK2yVhR",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-multivulns-kbK2yVhR",
        "defects": [
          "CSCvz20436"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20632",
    "datePublished": "2024-11-15T16:14:53.322Z",
    "dateReserved": "2021-11-02T13:28:29.030Z",
    "dateUpdated": "2024-11-15T18:00:56.895Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20631 (GCVE-0-2022-20631)

Vulnerability from nvd – Published: 2024-11-15 16:03 – Updated: 2024-11-15 16:25
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco&nbsp;ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious script code in a chat window. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 12.0(1)_ES6
Affected: 11.6(1)_ES8
Affected: 12.0(1)_ES5a
Affected: 11.6(1)_ES9
Affected: 12.0(1)_ES6_ET1
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES5
Affected: 12.5(1)_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES3_ET1
Affected: 12.0(1)_ES3
Affected: 11.6(1)_ES11
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES10
Affected: 12.0(1)_ES1
Affected: 12.0(1)
Affected: 12.5(1)_ES3
Affected: 12.6(1)
Affected: 11.5(1)
Affected: 12.0(1)_ES2
Affected: 11.6(1)_ES7
Affected: 12.5(1)_ES2
Affected: 12.6(1)_ET1
Affected: 11.6(1)
Affected: 12.5(1)_ES1
Affected: 11.5(1)_ES1_ET1
Affected: 11.6(1)_ES1
Affected: 11.6(1)_ES8_ET1
Affected: 11.5(1)_ES1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20631",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:25:48.751392Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T16:25:56.777Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            },
            {
              "status": "affected",
              "version": "11.5(1)_ES1_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "11.5(1)_ES1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device.\r\nThe vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious script code in a chat window. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T16:03:36.564Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-multivulns-kbK2yVhR",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-multivulns-kbK2yVhR",
        "defects": [
          "CSCvz20427"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20631",
    "datePublished": "2024-11-15T16:03:36.564Z",
    "dateReserved": "2021-11-02T13:28:29.029Z",
    "dateUpdated": "2024-11-15T16:25:56.777Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20634 (GCVE-0-2022-20634)

Vulnerability from nvd – Published: 2024-11-15 16:02 – Updated: 2024-11-15 16:28
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco&nbsp;ECE could allow an unauthenticated, remote attacker to redirect a user to an undesired web page. This vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect and is used in phishing attacks that get users to unknowingly visit malicious sites.Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE
  • CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 12.0(1)_ES6
Affected: 11.6(1)_ES8
Affected: 12.0(1)_ES5a
Affected: 11.6(1)_ES9
Affected: 12.0(1)_ES6_ET1
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES5
Affected: 12.5(1)_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES3_ET1
Affected: 12.0(1)_ES3
Affected: 11.6(1)_ES11
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES10
Affected: 12.0(1)_ES1
Affected: 12.0(1)
Affected: 12.5(1)_ES3
Affected: 12.6(1)
Affected: 11.5(1)
Affected: 12.0(1)_ES2
Affected: 11.6(1)_ES7
Affected: 12.5(1)_ES2
Affected: 12.6(1)_ET1
Affected: 11.6(1)
Affected: 12.5(1)_ES1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20634",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:27:50.770905Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T16:28:24.431Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;ECE could allow an unauthenticated, remote attacker to redirect a user to an undesired web page.\r\nThis vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect and is used in phishing attacks that get users to unknowingly visit malicious sites.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-601",
              "description": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-15T16:02:16.937Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-multivulns-kbK2yVhR",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-multivulns-kbK2yVhR",
        "defects": [
          "CSCvz50629"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Open Redirect Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20634",
    "datePublished": "2024-11-15T16:02:16.937Z",
    "dateReserved": "2021-11-02T13:28:29.030Z",
    "dateUpdated": "2024-11-15T16:28:24.431Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20484 (GCVE-0-2024-20484)

Vulnerability from nvd – Published: 2024-11-06 16:29 – Updated: 2024-11-06 17:20
VLAI?
Summary
A vulnerability in the External Agent Assignment Service (EAAS) feature of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of Media Routing Peripheral Interface Manager (MR PIM) traffic that is received by an affected device. An attacker could exploit this vulnerability by sending crafted MR PIM traffic to an affected device. A successful exploit could allow the attacker to trigger a failure on the MR PIM connection between Cisco ECE and Cisco Unified Contact Center Enterprise (CCE), leading to a DoS condition on EAAS that would prevent customers from starting chat, callback, or delayed callback sessions. Note: When the attack traffic stops, the EAAS process must be manually restarted to restore normal operation. To restart the process in the System Console, choose Shared Resources &gt; Services &gt; Unified CCE &gt; EAAS, then click Start.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 12.0(1)_ES6
Affected: 11.6(1)_ES9
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES5
Affected: 12.5(1)_ET1
Affected: 12.5(1)_ES3_ET1
Affected: 12.0(1)_ES3
Affected: 11.6(1)_ES11
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES10
Affected: 12.0(1)_ES1
Affected: 12.0(1)
Affected: 12.5(1)_ES3
Affected: 12.6(1)
Affected: 11.5(1)
Affected: 12.0(1)_ES2
Affected: 11.6(1)_ES7
Affected: 12.6(1)_ET1
Affected: 11.6(1)
Affected: 12.6(1)_ET2
Affected: 12.5(1)_ES3_ET2
Affected: 12.0(1)_ES6_ET2
Affected: 12.6(1)_ES1
Affected: 11.6(1)_ES12
Affected: 12.6(1)_ET3
Affected: 12.5(1)_ES4_ET1
Affected: 12.0(1)_ES6_ET3
Affected: 12.6(1)_ES1_ET1
Affected: 12.6(1)_ES2
Affected: 12.6_ES2_ET1
Affected: 12.5(1)_ES5
Affected: 12.6_ES2_ET2
Affected: 12.0(1)_ES7
Affected: 12.6_ES2_ET3
Affected: 12.0(1)_ES7_ET1
Affected: 12.5(1)_ES5_ET1
Affected: 12.6_ES2_ET4
Affected: 12.6(1)_ES3
Affected: 11.6(1)_ES12_ET1
Affected: 12.6_ES3_ET1
Affected: 12.6_ES3_ET2
Affected: 12.6(1)_ES4
Affected: 12.5(1)_ES7
Affected: 12.6(1)_ES4_ET1
Affected: 12.6(1)_ES5
Affected: 12.6(1)_ES5_ET1
Affected: 12.6(1)_ES5_ET2
Affected: 12.6(1)_ES6
Affected: 12.6(1)_ES6_ET1
Affected: 12.5(1)_ES8
Affected: 12.6(1)_ES6_ET2
Affected: 12.6(1)_ES7
Affected: 12.6(1)_ES8
Affected: 12.6(1)_ES4_ET2
Affected: 12.6(1)_ES3_ET3
Affected: 12.6(1)_ES2_ET5
Affected: 12.6(1)_ES1_ET2
Affected: 12.6(1)_ES8_ET1
Affected: 12.6(1)_ES7_ET1
Affected: 12.6(1)_ES6_ET3
Affected: 12.6(1)_ES5_ET3
Affected: 12.5(1)_ES8_ET1
Affected: 12.5(1)_ES3_ET3
Affected: 12.5(1)_ES5_ET2
Affected: 12.5(1)_ES6_ET1
Affected: 12.5(1)_ES4_ET2
Affected: 12.5(1)_ES7_ET1
Affected: 12.6(1)_ES8_ET2
Affected: 12.6(1)_ES9
Affected: 12.6(1)_ES9_ET1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "enterprise_chat_and_email",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "11.6(1)_ES3"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES4"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES6"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES9"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES6"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES5"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ET1"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES3_ET1"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES3"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES11"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES4"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES5"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES2"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES9a"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES10"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES1"
              },
              {
                "status": "affected",
                "version": "12.0(1)"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES3"
              },
              {
                "status": "affected",
                "version": "12.6(1)"
              },
              {
                "status": "affected",
                "version": "11.5(1)"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES2"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES7"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ET1"
              },
              {
                "status": "affected",
                "version": "11.6(1)"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ET2"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES3_ET2"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES6_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES1"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES12"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ET3"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES4_ET1"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES6_ET3"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES1_ET1"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES2"
              },
              {
                "status": "affected",
                "version": "12.6_ES2_ET1"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES5"
              },
              {
                "status": "affected",
                "version": "12.6_ES2_ET2"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES7"
              },
              {
                "status": "affected",
                "version": "12.6_ES2_ET3"
              },
              {
                "status": "affected",
                "version": "12.0(1)_ES7_ET1"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES5_ET1"
              },
              {
                "status": "affected",
                "version": "12.6_ES2_ET4"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES3"
              },
              {
                "status": "affected",
                "version": "11.6(1)_ES12_ET1"
              },
              {
                "status": "affected",
                "version": "12.6_ES3_ET1"
              },
              {
                "status": "affected",
                "version": "12.6_ES3_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES4"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES7"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES4_ET1"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES5"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES5_ET1"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES5_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES6"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES6_ET1"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES8"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES6_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES7"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES8"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES4_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES3_ET3"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES2_ET5"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES1_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES8_ET1"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES7_ET1"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES6_ET3"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES5_ET3"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES8_ET1"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES3_ET3"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES5_ET2"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES6_ET1"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES4_ET2"
              },
              {
                "status": "affected",
                "version": "12.5(1)_ES7_ET1"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES8_ET2"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES9"
              },
              {
                "status": "affected",
                "version": "12.6(1)_ES9_ET1"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20484",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-06T17:20:15.324243Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-06T17:20:30.979Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET3"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET4"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2_ET5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES8_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES9_ET1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the External Agent Assignment Service (EAAS) feature of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of Media Routing Peripheral Interface Manager (MR PIM) traffic that is received by an affected device. An attacker could exploit this vulnerability by sending crafted MR PIM traffic to an affected device. A successful exploit could allow the attacker to trigger a failure on the MR PIM connection between Cisco ECE and Cisco Unified Contact Center Enterprise (CCE), leading to a DoS condition on EAAS that would prevent customers from starting chat, callback, or delayed callback sessions. Note: When the attack traffic stops, the EAAS process must be manually restarted to restore normal operation. To restart the process in the System Console, choose Shared Resources \u0026gt; Services \u0026gt; Unified CCE \u0026gt; EAAS, then click Start."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "Improper Input Validation",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-06T16:29:20.865Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-dos-Oqb9uFEv",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-Oqb9uFEv"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-dos-Oqb9uFEv",
        "defects": [
          "CSCwj26667"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Denial of Service Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20484",
    "datePublished": "2024-11-06T16:29:20.865Z",
    "dateReserved": "2023-11-08T15:08:07.684Z",
    "dateUpdated": "2024-11-06T17:20:30.979Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20367 (GCVE-0-2024-20367)

Vulnerability from nvd – Published: 2024-04-03 16:22 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: 11.5(1)
Affected: 11.6(1)
Affected: 11.6(1)_ES2
Affected: 11.6(1)_ES3
Affected: 11.6(1)_ES4
Affected: 11.6(1)_ES5
Affected: 11.6(1)_ES6
Affected: 11.6(1)_ES10
Affected: 11.6(1)_ES11
Affected: 11.6(1)_ES7
Affected: 11.6(1)_ES8
Affected: 11.6(1)_ES9
Affected: 11.6(1)_ES9a
Affected: 11.6(1)_ES12
Affected: 12.0(1)
Affected: 12.0(1)_ES1
Affected: 12.0(1)_ES2
Affected: 12.0(1)_ES3
Affected: 12.0(1)_ES4
Affected: 12.0(1)_ES5
Affected: 12.0(1)_ES5a
Affected: 12.0(1)_ES6
Affected: 12.0(1)_ES6_ET1
Affected: 12.0(1)_ES6_ET2
Affected: 12.0(1)_ES6_ET3
Affected: 12.0(1)_ES7
Affected: 12.0(1)_ES7_ET1
Affected: 12.5(1)
Affected: 12.5(1)_ES1
Affected: 12.5(1)_ES2
Affected: 12.5(1)_ES3
Affected: 12.5(1)_ES3_ET1
Affected: 12.5(1)_ET1
Affected: 12.5(1)_ES4
Affected: 12.5(1)_ES3_ET2
Affected: 12.5(1)_ES4_ET1
Affected: 12.5(1)_ES5
Affected: 12.5(1)_ES5_ET1
Affected: 12.5(1)_ES6
Affected: 12.5(1)_ES7
Affected: 12.5(1)_ES8
Affected: 12.6(1)
Affected: 12.6(1)_ET1
Affected: 12.6(1)_ET2
Affected: 12.6(1)_ES1
Affected: 12.6(1)_ET3
Affected: 12.6(1)_ES1_ET1
Affected: 12.6(1)_ES2
Affected: 12.6(1)_ES3
Affected: 12.6(1)_ES4
Affected: 12.6(1)_ES4_ET1
Affected: 12.6(1)_ES5
Affected: 12.6(1)_ES5_ET1
Affected: 12.6(1)_ES5_ET2
Affected: 12.6(1)_ES6
Affected: 12.6(1)_ES6_ET1
Affected: 12.6(1)_ES6_ET2
Affected: 12.6_ES2_ET1
Affected: 12.6_ES2_ET2
Affected: 12.6_ES2_ET3
Affected: 12.6_ES2_ET4
Affected: 12.6_ES3_ET1
Affected: 12.6_ES3_ET2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20367",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-03T19:09:37.153152Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:40:29.581Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:42.019Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-ece-xss-CSQxgxfM",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CSQxgxfM"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.5(1)"
            },
            {
              "status": "affected",
              "version": "11.6(1)"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES10"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES11"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES7"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES8"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES9a"
            },
            {
              "status": "affected",
              "version": "11.6(1)_ES12"
            },
            {
              "status": "affected",
              "version": "12.0(1)"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES5a"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES6_ET3"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.0(1)_ES7_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES3_ET2"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES7"
            },
            {
              "status": "affected",
              "version": "12.5(1)_ES8"
            },
            {
              "status": "affected",
              "version": "12.6(1)"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ET3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES1_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES3"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES4_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES5_ET2"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET1"
            },
            {
              "status": "affected",
              "version": "12.6(1)_ES6_ET2"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET2"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET3"
            },
            {
              "status": "affected",
              "version": "12.6_ES2_ET4"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET1"
            },
            {
              "status": "affected",
              "version": "12.6_ES3_ET2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r This vulnerability exists because the web UI does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-03T16:22:22.902Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ece-xss-CSQxgxfM",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-xss-CSQxgxfM"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-xss-CSQxgxfM",
        "defects": [
          "CSCwi28527"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20367",
    "datePublished": "2024-04-03T16:22:22.902Z",
    "dateReserved": "2023-11-08T15:08:07.653Z",
    "dateUpdated": "2024-08-01T21:59:42.019Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-20802 (GCVE-0-2022-20802)

Vulnerability from nvd – Published: 2022-05-27 14:06 – Updated: 2024-11-06 16:13
VLAI?
Summary
A vulnerability in the web interface of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input that is processed by the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:24:49.859Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20220518 Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-20802",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-06T15:58:10.731668Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-06T16:13:05.071Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2022-05-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web interface of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input that is processed by the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-27T14:06:33",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20220518 Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ece-strd-xss-BqFXO9D2",
        "defect": [
          [
            "CSCwa92119"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2022-05-18T23:00:00",
          "ID": "CVE-2022-20802",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Enterprise Chat and Email",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web interface of Cisco Enterprise Chat and Email (ECE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input that is processed by the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information. To successfully exploit this vulnerability, an attacker would need valid agent credentials."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "5.4",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20220518 Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-strd-xss-BqFXO9D2"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-ece-strd-xss-BqFXO9D2",
          "defect": [
            [
              "CSCwa92119"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2022-20802",
    "datePublished": "2022-05-27T14:06:34.048404Z",
    "dateReserved": "2021-11-02T00:00:00",
    "dateUpdated": "2024-11-06T16:13:05.071Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1877 (GCVE-0-2019-1877)

Vulnerability from nvd – Published: 2019-11-05 19:25 – Updated: 2024-11-21 19:05
VLAI?
Summary
A vulnerability in the HTTP API of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to download files attached through chat sessions. The vulnerability is due to insufficient authentication mechanisms on the file download function of the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to download files that other users attach through the chat feature. This vulnerability affects versions prior to 12.0(1)ES1.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: unspecified , < 12.0(1)ES1 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:42.955Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190619 Cisco Enterprise Chat and Email Attachment Download Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-ecea-dwnload"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1877",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-21T18:55:51.330414Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T19:05:56.918Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "12.0(1)ES1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-06-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the HTTP API of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to download files attached through chat sessions. The vulnerability is due to insufficient authentication mechanisms on the file download function of the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to download files that other users attach through the chat feature. This vulnerability affects versions prior to 12.0(1)ES1."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-05T19:25:36",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190619 Cisco Enterprise Chat and Email Attachment Download Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-ecea-dwnload"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190619-ecea-dwnload",
        "defect": [
          [
            "CSCvo99235"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Attachment Download Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-06-19T16:00:00-0700",
          "ID": "CVE-2019-1877",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Enterprise Chat and Email Attachment Download Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Enterprise Chat and Email",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "12.0(1)ES1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the HTTP API of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to download files attached through chat sessions. The vulnerability is due to insufficient authentication mechanisms on the file download function of the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to download files that other users attach through the chat feature. This vulnerability affects versions prior to 12.0(1)ES1."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "6.5",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190619 Cisco Enterprise Chat and Email Attachment Download Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-ecea-dwnload"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190619-ecea-dwnload",
          "defect": [
            [
              "CSCvo99235"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1877",
    "datePublished": "2019-11-05T19:25:36.092873Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-21T19:05:56.918Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1870 (GCVE-0-2019-1870)

Vulnerability from nvd – Published: 2019-06-05 16:30 – Updated: 2024-11-21 19:22
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco Enterprise Chat and Email (ECE) Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface or allow the attacker to access sensitive browser-based information.
CWE
Assigner
References
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
http://www.securityfocus.com/bid/108645 vdb-entryx_refsource_BID
Impacted products
Vendor Product Version
Cisco Cisco Enterprise Chat and Email Affected: unspecified , < 11.6(1) (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:42.879Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190605 Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ece-xss"
          },
          {
            "name": "108645",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/108645"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1870",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-21T18:58:13.778975Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T19:22:37.120Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "11.6(1)",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-06-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Enterprise Chat and Email (ECE) Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface or allow the attacker to access sensitive browser-based information."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-06T14:06:04",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190605 Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ece-xss"
        },
        {
          "name": "108645",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/108645"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190605-ece-xss",
        "defect": [
          [
            "CSCvo85826"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-06-05T16:00:00-0700",
          "ID": "CVE-2019-1870",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Enterprise Chat and Email",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "11.6(1)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web-based management interface of Cisco Enterprise Chat and Email (ECE) Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface or allow the attacker to access sensitive browser-based information."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "6.1",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190605 Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ece-xss"
            },
            {
              "name": "108645",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/108645"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190605-ece-xss",
          "defect": [
            [
              "CSCvo85826"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1870",
    "datePublished": "2019-06-05T16:30:38.980162Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-21T19:22:37.120Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1702 (GCVE-0-2019-1702)

Vulnerability from nvd – Published: 2019-03-11 22:00 – Updated: 2024-11-21 19:42
VLAI?
Summary
Multiple vulnerabilities in the web-based management interface of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit these vulnerabilities either by injecting malicious code in a chat window or by sending a crafted link to a user of the interface. In both cases, the attacker must persuade the user to click the crafted link or open the chat window that contains the attacker's code. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Version 11.6(1) is affected.
CWE
Assigner
References
http://www.securityfocus.com/bid/107314 vdb-entryx_refsource_BID
https://tools.cisco.com/security/center/content/C… vendor-advisoryx_refsource_CISCO
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:41.984Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "107314",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/107314"
          },
          {
            "name": "20190306 Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerabilities",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-chatmail-xss"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1702",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-21T18:59:58.305225Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T19:42:32.507Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Enterprise Chat and Email",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "11.6(1)"
            }
          ]
        }
      ],
      "datePublic": "2019-03-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple vulnerabilities in the web-based management interface of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit these vulnerabilities either by injecting malicious code in a chat window or by sending a crafted link to a user of the interface. In both cases, the attacker must persuade the user to click the crafted link or open the chat window that contains the attacker\u0027s code. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Version 11.6(1) is affected."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-03-12T09:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "107314",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/107314"
        },
        {
          "name": "20190306 Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerabilities",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-chatmail-xss"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190306-chatmail-xss",
        "defect": [
          [
            "CSCvn77926",
            "CSCvn77927"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerabilities",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-03-06T16:00:00-0800",
          "ID": "CVE-2019-1702",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerabilities"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Enterprise Chat and Email",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "11.6(1)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple vulnerabilities in the web-based management interface of Cisco Enterprise Chat and Email could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected software. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit these vulnerabilities either by injecting malicious code in a chat window or by sending a crafted link to a user of the interface. In both cases, the attacker must persuade the user to click the crafted link or open the chat window that contains the attacker\u0027s code. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Version 11.6(1) is affected."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "6.1",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "107314",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/107314"
            },
            {
              "name": "20190306 Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerabilities",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-chatmail-xss"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190306-chatmail-xss",
          "defect": [
            [
              "CSCvn77926",
              "CSCvn77927"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1702",
    "datePublished": "2019-03-11T22:00:00Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-21T19:42:32.507Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}