Cisco IronPort Encryption Appliance software contains a vulnerability that could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks. Updates are available.
Cisco IronPort Encryption Appliance software contains a vulnerability that could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks.
The vulnerability is due to improper sanitization on user-supplied input. An unauthenticated, remote attacker could exploit this vulnerability by convincing a targeted user to follow a malicious link. If successful, the attacker could exploit this vulnerability to access sensitive browser-based information or take actions as the user.
Cisco confirmed the vulnerability in a bug report and released software updates.
Cisco IronPort Encryption Appliance software versions prior to 6.5.3 are vulnerable.
To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link. In addition, only a user who could log in to the affected web-based management interface could participate in an exploit attempt. Because the management interface is likely restricted to only designated administrative users, few users within a given environment could be targets of exploitation.
Cisco IronPort confirmed the vulnerability in bug ID 72410.
This vulnerability was discovered and reported to Cisco by Craig Lambert of Dell SecureWorks.
An unauthenticated, remote attacker could exploit this vulnerability to access sensitive browser-based information or take actions in the affected application.
The vulnerability is due to improper sanitization on user input supplied to the Cisco IronPort web-based management interface.
An unauthenticated, remote attacker could exploit this vulnerability by convincing a user who could log in to the management interface to follow a malicious URL. When followed, the URL could submit malicious parameters to the affected software that could be returned to the user without proper sanitization and rendered in the user's browser. If successful, the attacker could execute arbitrary HTML or script code in the user's browser, allowing the attacker to take actions as the user in the affected software or access sensitive browser-based information.
Administrators are advised to apply the appropriate software updates.
Users are advised not to open e-mail messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in e-mail messages are safe, they are advised not to open them.
Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.
Administrators are advised to monitor affected systems.
Updated software is available through normal support channels.
LEGAL DISCLAIMER The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.