This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-18201 | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user. |
Mon, 31 Mar 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco identity Services Engine |
|
| CPEs | cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:* cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:* |
|
| Vendors & Products |
Cisco
Cisco identity Services Engine |
Wed, 21 Aug 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 Aug 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user. | |
| Title | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-08-21T19:53:51.297Z
Reserved: 2023-11-08T15:08:07.685Z
Link: CVE-2024-20486
Updated: 2024-08-21T19:53:46.306Z
Status : Analyzed
Published: 2024-08-21T20:15:08.933
Modified: 2025-03-31T18:20:38.103
Link: CVE-2024-20486
No data.
OpenCVE Enrichment
No data.
EUVD