CVE-2024-20383
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
15/05/2024
Last modified:
08/08/2025
Description
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.<br />
<br />
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Impact
Base Score 3.x
4.80
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:* | 15.5.1-024 (excluding) | |
| cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m100v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m300v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:secure_email_and_web_manager_virtual_appliance_m600v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_and_web_manager_m170:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_and_web_manager_m190:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_and_web_manager_m195:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_and_web_manager_m380:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_and_web_manager_m390:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_and_web_manager_m390x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_and_web_manager_m395:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_and_web_manager_m680:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_and_web_manager_m690:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_and_web_manager_m690x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:secure_email_and_web_manager_m695:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



