CVE-2019-1797 (CNNVD-201904-858)
中文标题:
Cisco Wireless LAN Controller(WLC)Software 跨站请求伪造漏洞
英文标题:
Cisco Wireless LAN Controller Software Cross-Site Request Forgery Vulnerability
漏洞描述
中文描述:
Cisco Wireless LAN Controller(WLC)Software是美国思科(Cisco)公司的一套用于配置和管理WLC(无线局域网控制器)的软件。 Cisco WLC Software中基于Web的管理界面存在跨站请求伪造漏洞,该漏洞源于WEB应用未充分验证请求是否来自可信用户。攻击者可利用该漏洞通过受影响客户端向服务器发送非预期的请求。
英文描述:
A vulnerability in the web-based management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on the device with the privileges of the user, including modifying the device configuration. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an interface user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the device with the privileges of the user. Software versions prior to 8.3.150.0, 8.5.135.0, and 8.8.100.0 are affected.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Wireless LAN Controller (WLC) | - | < 8.3.150.0 | - |
cpe:2.3:a:cisco:cisco_wireless_lan_controller_(wlc):*:*:*:*:*:*:*:*
|
| cisco | wireless_lan_controller_software | * | - | - |
cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.0 (cna)
HIGHCVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2019-1797 |
2025-11-11 15:20:08 | 2025-11-11 07:35:39 |
| NVD | nvd_CVE-2019-1797 |
2025-11-11 14:56:21 | 2025-11-11 07:44:10 |
| CNNVD | cnnvd_CNNVD-201904-858 |
2025-11-11 15:10:11 | 2025-11-11 07:54:29 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 跨站请求伪造
- cnnvd_id: 未提取 -> CNNVD-201904-858
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 3 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']