CVE-2024-20258
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
15/05/2024
Last modified:
31/07/2025
Description
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface.<br />
<br />
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Impact
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:* | 15.0.2-034 (excluding) | |
| cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:* | 15.5 (including) | 15.5.1-055 (excluding) |
| cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_gateway_c190:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_gateway_c390:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_gateway_c690:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_gateway_c690x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:* | 15.5.1-024 (excluding) | |
| cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



