CVE-2019-1797
Summary
| CVE | CVE-2019-1797 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-04-18 01:29:00 UTC |
| Updated | 2021-04-21 15:50:00 UTC |
| Description | A vulnerability in the web-based management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on the device with the privileges of the user, including modifying the device configuration. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an interface user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the device with the privileges of the user. Software versions prior to 8.3.150.0, 8.5.135.0, and 8.8.100.0 are affected. |
Risk And Classification
Problem Types: CWE-352
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cisco | Wireless Lan Controller | All | All | All | All |
| Application | Cisco | Wireless Lan Controller | All | All | All | All |
| Operating System | Cisco | Wireless Lan Controller Software | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Wireless LAN Controller Software CVE-2019-1797 Cross Site Request Forgery Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Cisco Wireless LAN Controller Software Cross-Site Request Forgery Vulnerability | CISCO | tools.cisco.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.