A vulnerability in the web-based management interface of Cisco Mobility Express Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user with an active session on an affected device to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions, including modifying the configuration, with the privilege level of the user.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
6300 Series Access Points
Subscribe
6300 Series Access Points Firmware
Subscribe
Aironet 1542d
Subscribe
Aironet 1542d Firmware
Subscribe
Aironet 1542i
Subscribe
Aironet 1542i Firmware
Subscribe
Aironet 1562d
Subscribe
Aironet 1562d Firmware
Subscribe
Aironet 1562e
Subscribe
Aironet 1562e Firmware
Subscribe
Aironet 1562i
Subscribe
Aironet 1562i Firmware
Subscribe
Aironet 1815
Subscribe
Aironet 1815 Firmware
Subscribe
Aironet 1830
Subscribe
Aironet 1830 Firmware
Subscribe
Aironet 1840
Subscribe
Aironet 1840 Firmware
Subscribe
Aironet 1850
Subscribe
Aironet 1850 Firmware
Subscribe
Aironet 2800e
Subscribe
Aironet 2800e Firmware
Subscribe
Aironet 2800i
Subscribe
Aironet 2800i Firmware
Subscribe
Aironet 3800e
Subscribe
Aironet 3800e Firmware
Subscribe
Aironet 3800i
Subscribe
Aironet 3800i Firmware
Subscribe
Aironet 3800p
Subscribe
Aironet 3800p Firmware
Subscribe
Aironet 4800
Subscribe
Aironet 4800 Firmware
Subscribe
Catalyst Iw6300
Subscribe
Catalyst Iw6300 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-24532 | A vulnerability in the web-based management interface of Cisco Mobility Express Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user with an active session on an affected device to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions, including modifying the configuration, with the privilege level of the user. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 15 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-15T17:28:53.825Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3261
Updated: 2024-08-04T07:30:57.614Z
Status : Modified
Published: 2020-04-15T21:15:36.060
Modified: 2024-11-21T05:30:40.760
Link: CVE-2020-3261
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD