First published: Wed Sep 23 2020(Updated: )
A vulnerability in the web-based interface of Cisco Hosted Collaboration Mediation Fulfillment (HCM-F) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections by the affected software. An attacker could exploit this vulnerability by persuading a targeted user to click a malicious link. A successful exploit could allow the attacker to send arbitrary requests that could change the password of a targeted user. An attacker could then take unauthorized actions on behalf of the targeted user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Hosted Collaboration Mediation Fulfillment | <12.5\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3124 is a vulnerability in the web-based interface of Cisco Hosted Collaboration Mediation Fulfillment (HCM-F) that allows an unauthenticated attacker to conduct a cross-site request forgery (CSRF) attack.
CVE-2020-3124 affects Cisco Hosted Collaboration Mediation Fulfillment by not having sufficient CSRF protections, which allows unauthenticated remote attackers to conduct a CSRF attack.
CVE-2020-3124 has a severity rating of medium (6.5).
To fix the CVE-2020-3124 vulnerability, it is recommended to update Cisco Hosted Collaboration Mediation Fulfillment to version 12.5(1) or later.
More information about CVE-2020-3124 can be found on the Cisco Security Advisory page: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-hcm-f-csrf