VYPR
Medium severity6.1NVD Advisory· Published Oct 5, 2017· Updated May 13, 2026

CVE-2017-12265

CVE-2017-12265

Description

A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device, aka HREF XSS. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. The vulnerability exists in the Cisco Adaptive Security Appliance (ASA) Software when the WEBVPN feature is enabled. Cisco Bug IDs: CSCve91068.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cisco ASA Software web-based management interface HREF XSS vulnerability allows unauthenticated remote attackers to execute scripts via crafted link when WEBVPN is enabled.

Vulnerability

The vulnerability is a cross-site scripting (XSS) issue in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software. It exists when the WEBVPN feature is enabled and is due to insufficient validation of user-supplied input. Affected versions include those with the WEBVPN feature enabled, as indicated by the webvpn and enable outside commands in the configuration. [1]

Exploitation

An unauthenticated, remote attacker can exploit this vulnerability by persuading a user of the web-based management interface to click a crafted link. No authentication or special network position is required. The attack is conducted remotely via the web interface. [1]

Impact

Successful exploitation allows the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. This can lead to further compromise of the device or user data. [1]

Mitigation

Cisco has released software updates to address this vulnerability. Users should upgrade to a fixed version as specified in the Cisco Security Advisory. There are no workarounds available. [1]

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.