CVE-2024-20255Cross-Site Request Forgery in Cisco Expressway

Severity
7.1HIGHNVD
CNA8.2
EPSS
0.5%
top 36.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 7

Description

A vulnerability in the SOAP API of Cisco Expressway Series and Cisco TelePresence Video Communication Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the REST API to follow a crafted link. A successful exploit could allow the

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:LExploitability: 2.8 | Impact: 4.2

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-ccj9-9hx6-vgjf: A vulnerability in the SOAP API of Cisco Expressway Series and Cisco TelePresence Video Communication Server could allow an unauthenticated, remote at2024-02-07
CVEList
CVE-2024-20255: A vulnerability in the SOAP API of Cisco Expressway Series and Cisco TelePresence Video Communication Server could allow an unauthenticated, remote at2024-02-07

📋Vendor Advisories

1
Cisco
Cisco Expressway Series Cross-Site Request Forgery Vulnerabilities2024-02-07
CVE-2024-20255 — Cross-Site Request Forgery in Cisco | cvebase