Vulnerability Details : CVE-2014-3267
Cross-site request forgery (CSRF) vulnerability in the web framework in Cisco Security Manager 4.6 and earlier allows remote attackers to hijack the authentication of arbitrary users for requests that make unspecified changes, aka Bug ID CSCuo46427.
Vulnerability category: Cross-site request forgery (CSRF)
Exploit prediction scoring system (EPSS) score for CVE-2014-3267
Probability of exploitation activity in the next 30 days: 0.12%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 46 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-3267
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2014-3267
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3267
-
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3267
Cisco Security Manager Cross-Site Request Forgery VulnerabilityVendor Advisory
-
http://tools.cisco.com/security/center/viewAlert.x?alertId=34325
Cisco Security Manager Cross-Site Request Forgery VulnerabilityVendor Advisory
-
http://www.securitytracker.com/id/1030271
Cisco Security Manager Input Validation Flaw Permits Cross-Site Request Forgery Attacks - SecurityTrackerThird Party Advisory;VDB Entry
Products affected by CVE-2014-3267
- cpe:2.3:a:cisco:security_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.0.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.0:-:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.0.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.0.1:-:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.2:-:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.4:sp1:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.4:-:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.3:sp2:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.3:sp1:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.2:sp1:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.4:sp2:*:*:*:*:*:*
- cpe:2.3:a:cisco:security_manager:4.3:-:*:*:*:*:*:*