Cisco IP Phone Stored XSS (cisco-sa-uipphone-xss-NcmUykqA)

medium Nessus Plugin ID 186612


The remote device may be missing a vendor-supplied security patch.


According to its self-reported version, Cisco IP Phone Stored Cross-Site Scripting may be affected by a cross-site scripting (XSS) vulnerability. Due to insufficient validation of user-supplied input, an authenticated, remote attacker can conduct an XSS attacker against a user of the interface on the affected device. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials to access the web-based management interface of the affected device.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.


Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwf58592, CSCwf58594

See Also

Plugin Details

Severity: Medium

ID: 186612

File Name: cisco-sa-uipphone-xss-NcmUykqA.nasl

Version: 1.3

Type: remote

Family: CISCO

Published: 12/6/2023

Updated: 12/18/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.8


Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

CVSS Score Source: CVE-2023-20265


Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: x-cpe:/h:cisco:ip_phone, x-cpe:/o:cisco:ip_phone

Required KB Items: installed_sw/Cisco IP Phone, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 11/15/2023

Vulnerability Publication Date: 11/15/2023

Reference Information

CVE: CVE-2023-20265