Cisco Cyber Vision Center Stored Cross-Site Scripting Vulnerabilities
TL;DR 📌
Cisco Cyber Vision Center has multiple stored cross-site scripting (XSS) vulnerabilities that could allow authenticated remote attackers to execute arbitrary scripts. The highest CVSS score for these vulnerabilities is 5.4, categorized as Medium severity. There are no workarounds available, and users are advised to upgrade to fixed software releases.
What happened 🕵️♂️
Multiple vulnerabilities have been identified in the web-based management interface of Cisco Cyber Vision Center. These vulnerabilities arise from insufficient validation of user-supplied input, enabling authenticated attackers to conduct XSS attacks. Successful exploitation could allow attackers to execute arbitrary scripts or access sensitive browser-based information. Specifically, exploitation of CVE-2025-20356 requires administrative access to the Sensor Explorer page, while CVE-2025-20357 requires access to the Reports page.
Affected products 🖥️
The vulnerabilities affect Cisco Cyber Vision Center, regardless of device configuration. Cisco Cyber Vision Global Center and Cisco Cyber Vision Sensors are confirmed not to be vulnerable.
Fixed software 🔧
Upgrade to the first fixed release in your train (or later):
| Release / Product | First Fixed Release | Notes |
|---|---|---|
| 5.2 and earlier | Migrate to a fixed release. | |
| 5.3 | Not vulnerable. | |
| 5.0 and earlier | Not vulnerable. | |
| 5.1 | Migrate to a fixed release. | |
| 5.2 | Migrate to a fixed release. | |
| 1.0 | Initial public release. | |
| Cisco Cyber Vision Center | 5.3 | 5.2 and earlier |
| Cisco Cyber Vision Center | 5.1 | 5.0 and earlier |
| Cisco Cyber Vision Center | 5.2 | 5.1 |
Workarounds 🧯
There are no workarounds that address these vulnerabilities.
Risk in context 🎯
With a CVSS score of 5.4, the risk is categorized as Medium. The vulnerabilities require authenticated access, meaning they are not directly exploitable from the internet without valid credentials. However, if exploited, they could lead to significant data exposure and compromise the integrity of the web interface.
Fast facts ⚡
- Vulnerabilities: Stored XSS in Cisco Cyber Vision Center
- CVSS Score: 5.4 (Medium)
- Exploitation: Requires authenticated access
- Workarounds: None available
- Fixed Software: Upgrades to specific versions recommended
For leadership 🧭
The identified vulnerabilities in Cisco Cyber Vision Center present a Medium risk, primarily due to the requirement for authenticated access. This limits exposure to internal threats but still poses a risk of data compromise if exploited. Immediate action is recommended to mitigate this risk:
- Remediation ask: Patch within 7 days by upgrading to the fixed software releases.
- Operational impact: Expect a brief maintenance window with no configuration drift.
Now / Next / Later:
- Now: Review current software versions and identify affected systems.
- Next: Schedule and implement upgrades to the fixed software.
- Later: Monitor for any updates from Cisco regarding further vulnerabilities or patches.
Please note that exploitation of these vulnerabilities has not been publicly reported, but the absence of workarounds necessitates prompt action.