Lucene search

K
ciscoCiscoCISCO-SA-20151209-CERS
HistoryDec 10, 2015 - 8:30 a.m.

Cisco Emergency Responder Service Web Framework Cross-Site Request Forgery Vulnerability

2015-12-1008:30:00
tools.cisco.com
15

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.002

Percentile

52.2%

A vulnerability in the web framework of Cisco Emergency Responder server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of the web interface.

The vulnerability is due to insufficient CSRF protections. An attacker could exploit this vulnerability by persuading a user of an affected system to follow a malicious link or visit an attacker-controlled website. A successful exploit could allow the attacker to submit arbitrary requests to the affected device via the affected web browser and with the privileges of the user.

Cisco has not released software updates that address this vulnerability. There are no workarounds that mitigate this vulnerability.

This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-cers[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-cers”]

Affected configurations

Vulners
Node
ciscoemergency_responderMatchany
OR
ciscoemergency_responderMatchany
VendorProductVersionCPE
ciscoemergency_responderanycpe:2.3:a:cisco:emergency_responder:any:*:*:*:*:*:*:*

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.002

Percentile

52.2%

Related for CISCO-SA-20151209-CERS