CVE-2019-1904
| Summary |
A vulnerability in the web-based UI (web UI) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web UI on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or reload an affected device. This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS XE Software with the HTTP Server feature enabled. The default state of the HTTP Server feature is version dependent.
|
| Publication Date |
June 21, 2019, 12:15 p.m. |
| Registration Date |
Jan. 26, 2021, 11:40 a.m. |
| Last Update |
Nov. 21, 2024, 1:37 p.m. |
|
CVSS3.1 : HIGH
|
| スコア |
8.8
|
| Vector |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) |
ネットワーク |
| 攻撃条件の複雑さ(AC) |
低 |
| 攻撃に必要な特権レベル(PR) |
不要 |
| 利用者の関与(UI) |
要 |
| 影響の想定範囲(S) |
変更なし |
| 機密性への影響(C) |
高 |
| 完全性への影響(I) |
高 |
| 可用性への影響(A) |
高 |
|
CVSS2.0 : MEDIUM
|
| Score |
6.8
|
| Vector |
AV:N/AC:M/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) |
ネットワーク |
| 攻撃条件の複雑さ(AC) |
中 |
| 攻撃前の認証要否(Au) |
不要 |
| 機密性への影響(C) |
低 |
| 完全性への影響(I) |
低 |
| 可用性への影響(A) |
低 |
| Get all privileges. |
いいえ
|
| Get user privileges |
いいえ
|
| Get other privileges |
いいえ
|
| User operation required |
はい
|
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:* |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:* |
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:* |
| Configuration4 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:* |
| Configuration5 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:* |
| Configuration6 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:asr_1000_series_route_processor_\(rp2\):-:*:*:*:*:*:*:* |
| Configuration7 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:* |
| Configuration8 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:* |
| Configuration9 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:* |
| Configuration10 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:* |
Related information, measures and tools
Common Vulnerabilities List
JVN Vulnerability Information
Cisco IOS XE ソフトウェアにおけるクロスサイトリクエストフォージェリの脆弱性
| Title |
Cisco IOS XE ソフトウェアにおけるクロスサイトリクエストフォージェリの脆弱性
|
| Summary |
Cisco IOS XE ソフトウェアには、クロスサイトリクエストフォージェリの脆弱性
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
June 12, 2019, midnight |
| Registration Date |
June 27, 2019, 11:08 a.m. |
| Last Update |
June 27, 2019, 11:08 a.m. |
Affected System
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2019年06月27日] 掲載 |
June 27, 2019, 11:08 a.m. |