First published: Wed Sep 23 2020(Updated: )
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (UCM) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected device. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager | <11.5\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3135 is a vulnerability in the web-based management interface of Cisco Unified Communications Manager (UCM) that allows an unauthenticated attacker to conduct a cross-site request forgery (CSRF) attack.
CVE-2020-3135 has a severity rating of 8.8, which is considered high.
The affected software of CVE-2020-3135 is Cisco Unified Communications Manager version 11.5(1) and earlier.
An attacker can exploit CVE-2020-3135 by tricking a user into clicking on a specially crafted link or visiting a malicious website, which would initiate a CSRF attack.
Yes, Cisco has released a security advisory with mitigation measures to address the vulnerability. Please refer to the Cisco Security Advisory for more information.