First published: Fri May 03 2019(Updated: )
A vulnerability in the session management functionality of the web UI for the Cisco Umbrella Dashboard could allow an authenticated, remote attacker to access the Dashboard via an active, user session. The vulnerability exists due to the affected application not invalidating an existing session when a user authenticates to the application and changes the users credentials via another authenticated session. An attacker could exploit this vulnerability by using a separate, authenticated, active session to connect to the application through the web UI. A successful exploit could allow the attacker to maintain access to the dashboard via an authenticated user's browser session. Cisco has addressed this vulnerability in the Cisco Umbrella Dashboard. No user action is required.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Umbrella | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1807 has a medium severity rating due to the potential unauthorized access it allows.
To mitigate CVE-2019-1807, ensure that all user sessions are properly invalidated after logout and update to the latest version of Cisco Umbrella.
CVE-2019-1807 can be exploited by an authenticated remote attacker leveraging an active user session to gain unauthorized access.
CVE-2019-1807 affects various versions of Cisco Umbrella's web UI.
Yes, Cisco has released patches to address the vulnerability noted in CVE-2019-1807.