A vulnerability in the SOAP API of Cisco Expressway Series and Cisco TelePresence Video Communication Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the REST API to follow a crafted link. A successful exploit could allow the attacker to cause the affected system to reload.
References
Configurations
History
21 Nov 2024, 08:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-csrf-KnnZDMj3 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.2 |
15 Feb 2024, 15:54
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
CPE | cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:* | |
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-csrf-KnnZDMj3 - Vendor Advisory | |
First Time |
Cisco
Cisco expressway |
|
CWE | CWE-352 |
07 Feb 2024, 17:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-07 17:15
Updated : 2024-11-21 08:52
NVD link : CVE-2024-20255
Mitre link : CVE-2024-20255
CVE.ORG link : CVE-2024-20255
JSON object : View
Products Affected
cisco
- expressway
CWE
CWE-352
Cross-Site Request Forgery (CSRF)