First published: Thu Jun 20 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Prime Service Catalog Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protection mechanisms on the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Service Catalog | =11.0 | |
Cisco Prime Service Catalog | =11.1 | |
Cisco Prime Service Catalog | =12.0 | |
Cisco Prime Service Catalog | =12.1 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-psc-csrf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1874 is a vulnerability in the web-based management interface of Cisco Prime Service Catalog Software that allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.
CVE-2019-1874 exposes Cisco Prime Service Catalog Software to CSRF attacks, which can be launched remotely by an unauthenticated attacker.
CVE-2019-1874 has a severity rating of 8.8 (high).
To fix CVE-2019-1874, Cisco Prime Service Catalog Software should be updated to a version that includes sufficient CSRF protection mechanisms.
You can find more information about CVE-2019-1874 in the following references: [http://www.securityfocus.com/bid/108861](http://www.securityfocus.com/bid/108861) and [https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-psc-csrf](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-psc-csrf).