A vulnerability in the web-based management interface of Cisco Mobility Express Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user with an active session on an affected device to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions, including modifying the configuration, with the privilege level of the user.

Project Subscriptions

Vendors Products
6300 Series Access Points Subscribe
6300 Series Access Points Firmware Subscribe
Aironet 1542d Subscribe
Aironet 1542d Firmware Subscribe
Aironet 1542i Subscribe
Aironet 1542i Firmware Subscribe
Aironet 1562d Subscribe
Aironet 1562d Firmware Subscribe
Aironet 1562e Subscribe
Aironet 1562e Firmware Subscribe
Aironet 1562i Subscribe
Aironet 1562i Firmware Subscribe
Aironet 1815 Subscribe
Aironet 1815 Firmware Subscribe
Aironet 1830 Subscribe
Aironet 1830 Firmware Subscribe
Aironet 1840 Subscribe
Aironet 1840 Firmware Subscribe
Aironet 1850 Subscribe
Aironet 1850 Firmware Subscribe
Aironet 2800e Subscribe
Aironet 2800e Firmware Subscribe
Aironet 2800i Subscribe
Aironet 2800i Firmware Subscribe
Aironet 3800e Subscribe
Aironet 3800e Firmware Subscribe
Aironet 3800i Subscribe
Aironet 3800i Firmware Subscribe
Aironet 3800p Subscribe
Aironet 3800p Firmware Subscribe
Aironet 4800 Subscribe
Aironet 4800 Firmware Subscribe
Catalyst Iw6300 Subscribe
Catalyst Iw6300 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-24532 A vulnerability in the web-based management interface of Cisco Mobility Express Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user with an active session on an affected device to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions, including modifying the configuration, with the privilege level of the user.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-15T17:28:53.825Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3261

cve-icon Vulnrichment

Updated: 2024-08-04T07:30:57.614Z

cve-icon NVD

Status : Modified

Published: 2020-04-15T21:15:36.060

Modified: 2024-11-21T05:30:40.760

Link: CVE-2020-3261

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses