First published: Wed Apr 15 2020(Updated: )
A vulnerability in the web-based management interface of Cisco Mobility Express Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user with an active session on an affected device to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions, including modifying the configuration, with the privilege level of the user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Aironet 1542i Firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 1542i Firmware | =8.10\(1.255\) | |
Cisco Aironet 1542i Firmware | ||
Cisco Aironet 1542D | >=8.0<8.8.130.0 | |
Cisco Aironet 1542D | =8.10\(1.255\) | |
Cisco Aironet 1542D | ||
Cisco Aironet 1562 firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 1562 firmware | =8.10\(1.255\) | |
Cisco Aironet 1562 firmware | ||
Cisco Aironet 1562E | >=8.0<8.8.130.0 | |
Cisco Aironet 1562E | =8.10\(1.255\) | |
Cisco Aironet 1562E Firmware | ||
Cisco Aironet 1562 firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 1562 firmware | =8.10\(1.255\) | |
Cisco Aironet 1562 firmware | ||
Cisco Aironet 1815 Firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 1815 Firmware | =8.10\(1.255\) | |
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1830i Firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 1830i Firmware | =8.10\(1.255\) | |
Cisco Aironet 1830i Firmware | ||
Cisco Aironet 1840i Firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 1840i Firmware | =8.10\(1.255\) | |
Cisco Aironet 1840i Firmware | ||
Cisco Aironet 1850i Firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 1850i Firmware | =8.10\(1.255\) | |
Cisco Aironet 1850i Firmware | ||
Cisco Aironet 2800 Firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 2800 Firmware | =8.10\(1.255\) | |
Cisco Aironet 2800 Firmware | ||
Cisco Aironet 2800e Firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 2800e Firmware | =8.10\(1.255\) | |
Cisco Aironet 2800e Firmware | ||
Cisco Aironet 3800 Firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 3800 Firmware | =8.10\(1.255\) | |
Cisco Aironet 3800 Firmware | ||
Cisco Aironet 3800 Firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 3800 Firmware | =8.10\(1.255\) | |
Cisco Aironet 3800E Firmware | ||
Cisco Aironet 3800 Firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 3800 Firmware | =8.10\(1.255\) | |
Cisco Aironet 3800P Firmware | ||
Cisco Aironet 4800 Firmware | >=8.0<8.8.130.0 | |
Cisco Aironet 4800 Firmware | =8.10\(1.255\) | |
Cisco Aironet 4800 Firmware | ||
Cisco Catalyst IW6300 DC Firmware | >=8.0<8.8.130.0 | |
Cisco Catalyst IW6300 DC Firmware | =8.10\(1.255\) | |
Cisco Catalyst IW6300 AC Firmware | ||
Cisco 6300 Series Access Points Firmware | >=8.0<8.8.130.0 | |
Cisco 6300 Series Access Points Firmware | =8.10\(1.255\) | |
Cisco 6300 Series Access Points Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3261 is rated as high severity due to the potential for unauthenticated remote attacks using cross-site request forgery.
To fix CVE-2020-3261, you should upgrade the affected Cisco Mobility Express Software to the latest version that addresses the vulnerability.
CVE-2020-3261 affects various Cisco Aironet firmware versions, specifically those prior to version 8.8.130.0 and including 8.10(1.255).
Yes, CVE-2020-3261 can be exploited remotely by an unauthenticated attacker through cross-site request forgery.
CVE-2020-3261 is due to insufficient cross-site request forgery protections in the web-based management interface of Cisco Mobility Express Software.