[CIVN-2025-0248] Cross site scripting vulnerability in Cisco unified Communications Manager
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Cross site scripting vulnerability in Cisco unified Communications Manager
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: MEDIUM
Systems Affected
Cisco Unified CM and Cisco Unified CM SME
Overview
A vulnerability has been reported in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating in web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
This vulnerability exists due to web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface.
Successful exploitation of this vulnerability could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-stored-xss-Fnj66YLy
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-stored-xss-Fnj66YLy
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-stored-xss-Fnj66YLy
CVE Name
CVE-2025-20361
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=uGPt
—–END PGP SIGNATURE—–