Cisco Unified Intelligence Center CVE-2019-1658 Cross Site Request Forgery Vulnerability
BID:106713
CVE-2019-1658 |Info
Cisco Unified Intelligence Center CVE-2019-1658 Cross Site Request Forgery Vulnerability
| Bugtraq ID: | 106713 |
| Class: | Input Validation Error |
| CVE: |
CVE-2019-1658 |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 23 2019 12:00AM |
| Updated: | Jan 23 2019 12:00AM |
| Credit: | Cisco |
| Vulnerable: |
Cisco Unified Intelligence Center 11.6(1) |
| Not Vulnerable: | |
Discussion
Cisco Unified Intelligence Center CVE-2019-1658 Cross Site Request Forgery Vulnerability
Cisco Unified Intelligence Center is prone to a cross-site request-forgery vulnerability.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCvn41579.
Cisco Unified Intelligence Center is prone to a cross-site request-forgery vulnerability.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCvn41579.
Exploit / POC
Cisco Unified Intelligence Center CVE-2019-1658 Cross Site Request Forgery Vulnerability
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Cisco Unified Intelligence Center CVE-2019-1658 Cross Site Request Forgery Vulnerability
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Solution:
Updates are available. Please see the references or vendor advisory for more information.
References
Cisco Unified Intelligence Center CVE-2019-1658 Cross Site Request Forgery Vulnerability
References:
References: