6.1
CVSSv3

CVE-2023-20218

Published: 03/08/2023 Updated: 25/01/2024
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote malicious user to to modify a web page in the context of a user's browser. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the malicious user to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks. Cisco will not release software updates that address this vulnerability. {{value}} ["%7b%7bvalue%7d%7d"])}]]

Vulnerable Product Search on Vulmon Subscribe to Product

cisco spa500ds_firmware -

cisco spa500s_firmware -

cisco spa501g_firmware -

cisco spa502g_firmware -

cisco spa504g_firmware -

cisco spa508g_firmware -

cisco spa509g_firmware -

cisco spa512g_firmware -

cisco spa514g_firmware -

cisco spa525_firmware -

cisco spa525g_firmware -

cisco spa525g2_firmware -

Vendor Advisories

Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) or HTML injection attacks For more information about these vulnerabilities, see the Details section of this advisory There are no workarounds that addr ...