CVE-2020-3261
moderate-risk
Published 2020-04-15
A vulnerability in the web-based management interface of Cisco Mobility Express Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user with an active session on an affected device to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions, including modifying the configuration, with the privilege level of the user.
Do I need to act?
-
0.29% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
Aironet 1542I Firmware
Aironet 1542I Firmware
Aironet 1542D Firmware
Aironet 1542D Firmware
Aironet 1562I Firmware
Aironet 1562I Firmware
Aironet 1562E Firmware
Aironet 1562E Firmware
Aironet 1562D Firmware
Aironet 1562D Firmware
Aironet 1815 Firmware
Aironet 1815 Firmware
Aironet 1830 Firmware
Aironet 1830 Firmware
Aironet 1840 Firmware
Aironet 1840 Firmware
Aironet 1850 Firmware
Aironet 1850 Firmware
Aironet 2800I Firmware
Aironet 2800I Firmware
Affected Vendors
References (2)
48
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
1/34 · Minimal
Exposure
23/34 · High