CVE-2019-12718
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
16/10/2019
Last modified:
01/09/2020
Description
A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
Impact
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:* | 2.5.0.90 (excluding) | |
| cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:* | 2.5.0.90 (excluding) | |
| cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:* | 2.5.0.90 (excluding) | |
| cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:* | 2.5.0.90 (excluding) | |
| cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:sf250-08_firmware:*:*:*:*:*:*:*:* | 2.5.0.90 (excluding) | |
| cpe:2.3:h:cisco:sf250-08:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:sf250-08hp_firmware:*:*:*:*:*:*:*:* | 2.5.0.90 (excluding) | |
| cpe:2.3:h:cisco:sf250-08hp:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:sf250-10p_firmware:*:*:*:*:*:*:*:* | 2.5.0.90 (excluding) | |
| cpe:2.3:h:cisco:sf250-10p:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:sf250-18_firmware:*:*:*:*:*:*:*:* | 2.5.0.90 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



