First published: Wed Oct 21 2020(Updated: )
A vulnerability in the Cisco Firepower Chassis Manager (FCM) of Cisco FXOS Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a user of an affected device. The vulnerability is due to insufficient CSRF protections for the FCM interface. An attacker could exploit this vulnerability by persuading a targeted user to click a malicious link. A successful exploit could allow the attacker to send arbitrary requests that could take unauthorized actions on behalf of the targeted user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxosfcm-csrf-uhO4e5BZ
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FX-OS | ||
Cisco ASA Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
It is a vulnerability in the Cisco Firepower Chassis Manager (FCM) of Cisco FXOS Software that allows an unauthenticated, remote attacker to conduct CSRF attacks against a user of an affected device.
The vulnerability occurs due to insufficient CSRF protections for the FCM interface.
The vulnerability has a severity rating of 8.8 (high).
The vulnerability affects Cisco FXOS Software and Cisco ASA Software.
There is no specific remedy mentioned for the vulnerability at present. Please refer to Cisco's security advisory for updates.