CVE-2020-3148 (CNNVD-202003-182)
中文标题:
Cisco Prime Network Registrar 跨站请求伪造漏洞
英文标题:
Cisco Prime Network Registrar Cross-Site Request Forgery Vulnerability
漏洞描述
中文描述:
Cisco Prime Network Registrar(CPNR)是美国思科(Cisco)公司的一款网络注册器产品。该产品提供了动态主机配置协议(DHCP)、域名系统(DNS)和IP地址管理(IPAM)等服务。 Cisco CPNR 10.1之前版本(releases)中基于Web的接口存在跨站请求伪造漏洞,该漏洞源于程序没有进行充分的跨站请求伪造保护。远程攻击者可通过诱使用户点击恶意链接利用该漏洞修改设备配置,进而可以编辑或创建任意权限用户的账户。
英文描述:
A vulnerability in the web-based interface of Cisco Prime Network Registrar (CPNR) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections in the web-based interface. An attacker could exploit this vulnerability by persuading a targeted user, with an active administrative session on the affected device, to click a malicious link. A successful exploit could allow an attacker to change the device's configuration, which could include the ability to edit or create user accounts of any privilege level. Some changes to the device's configuration could negatively impact the availability of networking services for other devices on networks managed by CPNR.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Prime Network Registrar | - | < n/a | - |
cpe:2.3:a:cisco:cisco_prime_network_registrar:*:*:*:*:*:*:*:*
|
| cisco | prime_network_registrar | * | - | - |
cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
HIGHCVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-3148 |
2025-11-11 15:20:36 | 2025-11-11 07:36:18 |
| NVD | nvd_CVE-2020-3148 |
2025-11-11 14:56:56 | 2025-11-11 07:44:43 |
| CNNVD | cnnvd_CNNVD-202003-182 |
2025-11-11 15:10:22 | 2025-11-11 07:55:39 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 跨站请求伪造
- cnnvd_id: 未提取 -> CNNVD-202003-182
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']