Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) (CWE-80)
A vulnerability in the VPN web client services feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a browser that is accessing an affected device. This vulnerability is due to improper validation of user-supplied input to application endpoints. An attacker could exploit this vulnerability by persuading a user to follow a link designed to submit malicious input to the affected application.
A successful exploit could allow the attacker to execute arbitrary HTML or script code in the browser in the context of the web services page. This could lead to the theft of sensitive browser-based information, such as session tokens or cookies, or allow the attacker to perform actions on the web interface with the privileges of the victim user. The attacker might be able to manipulate the behavior of the web application, potentially leading to further attacks against the user or the application itself.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available for this vulnerability. Cisco has released software updates that address this issue. Users should upgrade to the latest version of Cisco ASA Software or Cisco Firepower Threat Defense Software as appropriate for their deployment.
To mitigate this vulnerability: 1. Apply the latest software updates provided by Cisco for ASA and FTD Software. 2. Implement strong user education and awareness programs to help users identify and avoid suspicious links. 3. Consider implementing content security policies (CSP) to reduce the risk of XSS attacks. 4. Regularly review and validate input handling mechanisms in web applications. 5. Use web application firewalls (WAF) to provide an additional layer of protection against XSS attacks. 6. Limit access to the VPN web client services interface to trusted networks and users where possible.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
NVD published the first details for CVE-2024-20341
A CVSS base score of 6.1 has been assigned.
Feedly found the first article mentioning CVE-2024-20341. See article
Feedly estimated the CVSS score as MEDIUM
Detection for the vulnerability has been added to Qualys (317547)
EPSS Score was set to: 0.05% (Percentile: 16.6%)
Detection for the vulnerability has been added to Qualys (317561)