CVE-2020-3121 (CNNVD-202001-1124)
中文标题:
多款Cisco产品跨站脚本漏洞
英文标题:
Cisco Small Business Smart and Managed Switches Cross-Site Scripting Vulnerability
漏洞描述
中文描述:
Cisco 350 Series Managed Switches和550X Series Stackable Managed Switches都是美国思科(Cisco)公司的产品。Cisco 350 Series Managed Switches是一款350系列管理型交换机。550X Series Stackable Managed Switches是一款550X系列管理型交换机。 使用2.5.0.90及之前版本固件的Cisco S250 Series Smart Switches、350 Series Managed Switches和550X Series Stackable Managed Switches中存在跨站脚本漏洞。该漏洞源于程序没有对用户输入进行充分验证。远程攻击者可借助特制的链接利用漏洞执行任意代码。
英文描述:
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and access a specific page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco 550X Series Stackable Managed Switches | - | < n/a | - |
cpe:2.3:a:cisco:cisco_550x_series_stackable_managed_switches:*:*:*:*:*:*:*:*
|
| cisco | sg250x-24_firmware | * | - | - |
cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250x-24p_firmware | * | - | - |
cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250x-48_firmware | * | - | - |
cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250x-48p_firmware | * | - | - |
cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-08_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-08hp_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-10p_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-18_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-26_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-26hp_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-26p_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-50_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-50hp_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-50p_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-24_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-24_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-24p_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-24p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-48_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-48_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg250-48hp_firmware | * | - | - |
cpe:2.3:o:cisco:sg250-48hp_firmware:*:*:*:*:*:*:*:*
|
| cisco | sf350-48_firmware | * | - | - |
cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*
|
| cisco | sf350-48p_firmware | * | - | - |
cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sf350-48mp_firmware | * | - | - |
cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg350-10_firmware | * | - | - |
cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg350-10p_firmware | * | - | - |
cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg350-10mp_firmware | * | - | - |
cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg355-10mp_firmware | * | - | - |
cpe:2.3:o:cisco:sg355-10mp_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg350-28_firmware | * | - | - |
cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg350-28p_firmware | * | - | - |
cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg350-28mp_firmware | * | - | - |
cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*
|
| cisco | sx550x-16ft_firmware | * | - | - |
cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*
|
| cisco | sx550x-24ft_firmware | * | - | - |
cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*
|
| cisco | sx550x-12ft_firmware | * | - | - |
cpe:2.3:o:cisco:sx550x-12ft_firmware:*:*:*:*:*:*:*:*
|
| cisco | sx550x-24_firmware | * | - | - |
cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*
|
| cisco | sx550x-52_firmware | * | - | - |
cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg550x-24_firmware | * | - | - |
cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg550x-24p_firmware | * | - | - |
cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg550x-24mp_firmware | * | - | - |
cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg550x-24mpp_firmware | * | - | - |
cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg550x-48_firmware | * | - | - |
cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg550x-48p_firmware | * | - | - |
cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sg550x-48mp_firmware | * | - | - |
cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*
|
| cisco | sf550x-24_firmware | * | - | - |
cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*
|
| cisco | sf550x-24p_firmware | * | - | - |
cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sf550x-48_firmware | * | - | - |
cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*
|
| cisco | sf550x-48p_firmware | * | - | - |
cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*
|
| cisco | sf550x-48mp_firmware | * | - | - |
cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
MEDIUMCVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-3121 |
2025-11-11 15:20:36 | 2025-11-11 07:36:18 |
| NVD | nvd_CVE-2020-3121 |
2025-11-11 14:56:55 | 2025-11-11 07:44:43 |
| CNNVD | cnnvd_CNNVD-202001-1124 |
2025-11-11 15:10:21 | 2025-11-11 07:55:20 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 跨站脚本
- cnnvd_id: 未提取 -> CNNVD-202001-1124
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 46
- data_sources: ['cve'] -> ['cve', 'nvd']