First published: Wed Jun 05 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Industrial Network Director (IND) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to use a web browser and the privileges of the user to perform arbitrary actions on an affected device. For more information about CSRF attacks and potential mitigations, see Understanding Cross-Site Request Forgery Threat Vectors.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Industrial Network Director | =1.5\(0.250\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1881 is a vulnerability in the web-based management interface of Cisco Industrial Network Director (IND) that allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device.
CVE-2019-1881 is considered a high-severity vulnerability, with a severity score of 8.8 out of 10.
CVE-2019-1881 affects Cisco Industrial Network Director version 1.5(0.250) and allows an attacker to perform CSRF attacks and manipulate the device.
To fix CVE-2019-1881, Cisco recommends upgrading to a fixed software release or applying a suggested workaround.
You can find more information about CVE-2019-1881 in the Cisco Security Advisory and the SecurityFocus website.