CVE-2017-12265
Description
A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device, aka HREF XSS. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. The vulnerability exists in the Cisco Adaptive Security Appliance (ASA) Software when the WEBVPN feature is enabled. Cisco Bug IDs: CSCve91068.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cisco ASA Software web-based management interface HREF XSS vulnerability allows unauthenticated remote attackers to execute scripts via crafted link when WEBVPN is enabled.
Vulnerability
The vulnerability is a cross-site scripting (XSS) issue in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software. It exists when the WEBVPN feature is enabled and is due to insufficient validation of user-supplied input. Affected versions include those with the WEBVPN feature enabled, as indicated by the webvpn and enable outside commands in the configuration. [1]
Exploitation
An unauthenticated, remote attacker can exploit this vulnerability by persuading a user of the web-based management interface to click a crafted link. No authentication or special network position is required. The attack is conducted remotely via the web interface. [1]
Impact
Successful exploitation allows the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. This can lead to further compromise of the device or user data. [1]
Mitigation
Cisco has released software updates to address this vulnerability. Users should upgrade to a fixed version as specified in the Cisco Security Advisory. There are no workarounds available. [1]
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- cpe:2.3:a:cisco:adaptive_security_appliance:-:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.securityfocus.com/bid/101170nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039502nvdThird Party AdvisoryVDB Entry
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-asa1nvdVendor Advisory
News mentions
0No linked articles in our index yet.