3.5
CVSSv2

CVE-2019-16008

Published: 26/01/2020 Updated: 29/01/2020
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote malicious user to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based GUI of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the malicious user to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ip_phone_6841_firmware

cisco ip_phone_6851_firmware

cisco ip_phone_6825_firmware

cisco ip_phone_6861_firmware

cisco ip_phone_6871_firmware

cisco ip_phone_6821_firmware

cisco ip_phone_7811_firmware

cisco ip_phone_7821_firmware

cisco ip_phone_7832_firmware

cisco ip_phone_7841_firmware

cisco ip_phone_7861_firmware

cisco ip_phone_8811_firmware

cisco ip_phone_8831_firmware

cisco ip_phone_8832_firmware

cisco ip_phone_8841_firmware

cisco ip_phone_8845_firmware

cisco ip_phone_8851_firmware

cisco ip_phone_8861_firmware

cisco ip_phone_8865_firmware

Vendor Advisories

A vulnerability in the web-based GUI of Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface of an affected system The vulnerability is due to insufficient validation of user-supplied input by the ...