A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface.r
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
CVSS
No CVSS.
References
Configurations
Configuration 1 (hide)
AND |
|
History
06 Aug 2025, 16:56
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco secure Email Gateway Virtual Appliance C300v
Cisco secure Email Gateway C695 Cisco Cisco secure Email Gateway Virtual Appliance C100v Cisco secure Email Gateway C195 Cisco asyncos Cisco secure Email Gateway Virtual Appliance C600v Cisco secure Email Gateway C395 |
|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-xss-bgG5WHODÂ - Vendor Advisory | |
CPE | cpe:2.3:o:cisco:asyncos:12.5.0-066:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:14.2.0-620:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:15.0.1-030:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:12.0.0-419:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:12.5.4-041:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:12.1.0-089:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:12.1.0-087:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:13.0.5-007:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:13.5.4-038:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c300v:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:secure_email_gateway_c695:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:13.0.0-392:*:*:*:*:*:*:* cpe:2.3:h:cisco:secure_email_gateway_c395:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:12.5.3-041:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:14.0.0-698:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:11.0.3-238:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c600v:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:15.5.0-048:*:*:*:*:*:*:* cpe:2.3:h:cisco:secure_email_gateway_c195:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_email_gateway_virtual_appliance_c100v:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:11.1.0-069:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:14.2.1-020:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:15.0.0-104:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:11.1.0-131:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:12.1.0-071:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:13.5.1-277:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:14.3.0-032:*:*:*:*:*:*:* cpe:2.3:o:cisco:asyncos:11.1.0-128:*:*:*:*:*:*:* |
15 May 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-15 18:15
Updated : 2025-08-06 16:56
NVD link : CVE-2024-20257
Mitre link : CVE-2024-20257
JSON object : View
Products Affected
cisco
- secure_email_gateway_virtual_appliance_c100v
- secure_email_gateway_virtual_appliance_c600v
- secure_email_gateway_virtual_appliance_c300v
- secure_email_gateway_c195
- secure_email_gateway_c695
- secure_email_gateway_c395
- asyncos
CWE
No CWE.