CVE-2020-3261
Severity CVSS v4.0:
Pending analysis
Type:
CWE-352
Cross-Site Request Forgery (CSRF)
Publication date:
15/04/2020
Last modified:
29/04/2020
Description
A vulnerability in the web-based management interface of Cisco Mobility Express Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user with an active session on an affected device to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions, including modifying the configuration, with the privilege level of the user.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:cisco:aironet_1542i_firmware:*:*:*:*:*:*:*:* | 8.0 (including) | 8.8.130.0 (excluding) |
cpe:2.3:o:cisco:aironet_1542i_firmware:8.10\(1.255\):*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:aironet_1542d_firmware:*:*:*:*:*:*:*:* | 8.0 (including) | 8.8.130.0 (excluding) |
cpe:2.3:o:cisco:aironet_1542d_firmware:8.10\(1.255\):*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:aironet_1562i_firmware:*:*:*:*:*:*:*:* | 8.0 (including) | 8.8.130.0 (excluding) |
cpe:2.3:o:cisco:aironet_1562i_firmware:8.10\(1.255\):*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:aironet_1562e_firmware:*:*:*:*:*:*:*:* | 8.0 (including) | 8.8.130.0 (excluding) |
cpe:2.3:o:cisco:aironet_1562e_firmware:8.10\(1.255\):*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:aironet_1562d_firmware:*:*:*:*:*:*:*:* | 8.0 (including) | 8.8.130.0 (excluding) |
cpe:2.3:o:cisco:aironet_1562d_firmware:8.10\(1.255\):*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page