CVE-2019-1797

Severity
8.8HIGH
EPSS
0.2%
top 59.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 18
Latest updateMay 13

Description

A vulnerability in the web-based management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on the device with the privileges of the user, including modifying the device configuration. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persu

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDcisco/wireless_lan_controller_software8.5.131.08.5.150.0+2
CVEListV5cisco/cisco_wireless_lan_controller_(wlc)unspecified8.3.150.0+2

🔴Vulnerability Details

2
GHSA
GHSA-8234-7c3q-xx3r: A vulnerability in the web-based management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker2022-05-13
CVEList
Cisco Wireless LAN Controller Software Cross-Site Request Forgery Vulnerability2019-04-18

📋Vendor Advisories

1
Cisco
Cisco Wireless LAN Controller Software Cross-Site Request Forgery Vulnerability2019-04-17
CVE-2019-1797 (HIGH CVSS 8.8) | A vulnerability in the web-based ma | cvebase.io