A vulnerability in the web-based management interface of Cisco Prime Access Registrar could allow an authenticated, remote attacker to perform a stored cross-site scripting attack on an affected system. This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid administrative credentials. Cisco expects to release software updates that address this vulnerability.
References
Configurations
History
21 Nov 2024, 06:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpar-strd-xss-A4DCVETG - Vendor Advisory |
Information
Published : 2021-11-04 16:15
Updated : 2024-11-21 06:11
NVD link : CVE-2021-34731
Mitre link : CVE-2021-34731
CVE.ORG link : CVE-2021-34731
JSON object : View
Products Affected
cisco
- prime_access_registrar
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')