Cisco Wireless LAN Controller Software Cross-Site Request Forgery Vulnerability
CVE-2019-1797

8.1HIGH

Key Information:

Vendor
Cisco
Vendor
CVE Published:
18 April 2019

Badges

👾 Exploit Exists

Summary

A vulnerability in the web-based management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on the device with the privileges of the user, including modifying the device configuration. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an interface user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the device with the privileges of the user. Software versions prior to 8.3.150.0, 8.5.135.0, and 8.8.100.0 are affected.

Affected Version(s)

Cisco Wireless LAN Controller (WLC) < 8.3.150.0

Cisco Wireless LAN Controller (WLC) < 8.5.135.0

Cisco Wireless LAN Controller (WLC) < 8.8.100.0

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.