Description

A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

INFO

Published Date :

2024-05-15T17:32:16.125Z

Last Modified :

2024-08-01T21:52:31.784Z

Source :

cisco
AFFECTED PRODUCTS

The following products are affected by CVE-2024-20258 vulnerability.

Vendors Products
Cisco
  • Asyncos
  • Secure Email And Web Manager M170
  • Secure Email And Web Manager M190
  • Secure Email And Web Manager M195
  • Secure Email And Web Manager M380
  • Secure Email And Web Manager M390
  • Secure Email And Web Manager M390x
  • Secure Email And Web Manager M395
  • Secure Email And Web Manager M680
  • Secure Email And Web Manager M690
  • Secure Email And Web Manager M690x
  • Secure Email And Web Manager M695
  • Secure Email And Web Manager Virtual Appliance M100v
  • Secure Email And Web Manager Virtual Appliance M300v
  • Secure Email And Web Manager Virtual Appliance M600v
  • Secure Email Gateway C190
  • Secure Email Gateway C195
  • Secure Email Gateway C390
  • Secure Email Gateway C395
  • Secure Email Gateway C690
  • Secure Email Gateway C690x
  • Secure Email Gateway C695
  • Secure Email Gateway Virtual Appliance C100v
  • Secure Email Gateway Virtual Appliance C300v
  • Secure Email Gateway Virtual Appliance C600v
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-20258.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact