CVE-2020-3261 (CNNVD-202004-1102)
中文标题:
Cisco Mobility Express Software 跨站请求伪造漏洞
英文标题:
Cisco Mobility Express Software Cross-Site Request Forgery Vulnerability
漏洞描述
中文描述:
Cisco Mobility Express Software是美国思科(Cisco)公司的一套使用在Cisco无线接入点设备中的软件。 Cisco Mobility Express Software中的基于Web的管理接口存在跨站请求伪造漏洞。攻击者可通过诱使用户点击恶意链接利用该漏洞进行任意操作。以下产品及版本受到影响:Cisco Aironet 1540 Series Access Points;Aironet 1560 Series Access Points;Aironet 1800 Series Access Points;Aironet 2800 Series Access Points;Aironet 3800 Series Access Points;Aironet 4800 Series Access Points;Catalyst IW6300 Access Points;6300 Embedded Services Access Points。
英文描述:
A vulnerability in the web-based management interface of Cisco Mobility Express Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user with an active session on an affected device to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions, including modifying the configuration, with the privilege level of the user.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Mobility Express | n/a | - | - |
cpe:2.3:a:cisco:cisco_mobility_express:n_a:*:*:*:*:*:*:*
|
| cisco | aironet_1542i_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_1542i_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_1542i_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_1542i_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_1542d_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_1542d_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_1542d_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_1542d_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_1562i_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_1562i_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_1562i_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_1562i_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_1562e_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_1562e_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_1562e_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_1562e_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_1562d_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_1562d_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_1562d_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_1562d_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_1815_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_1815_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_1815_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_1815_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_1830_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_1830_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_1830_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_1830_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_1840_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_1840_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_1840_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_1840_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_1850_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_1850_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_1850_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_1850_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_2800i_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_2800i_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_2800i_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_2800i_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_2800e_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_2800e_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_2800e_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_2800e_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_3800i_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_3800i_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_3800i_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_3800i_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_3800e_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_3800e_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_3800e_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_3800e_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_3800p_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_3800p_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_3800p_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_3800p_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | aironet_4800_firmware | * | - | - |
cpe:2.3:o:cisco:aironet_4800_firmware:*:*:*:*:*:*:*:*
|
| cisco | aironet_4800_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:aironet_4800_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | catalyst_iw6300_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_iw6300_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_iw6300_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:catalyst_iw6300_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
| cisco | 6300_series_access_points_firmware | * | - | - |
cpe:2.3:o:cisco:6300_series_access_points_firmware:*:*:*:*:*:*:*:*
|
| cisco | 6300_series_access_points_firmware | 8.10\(1.255\) | - | - |
cpe:2.3:o:cisco:6300_series_access_points_firmware:8.10\(1.255\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
HIGHCVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-3261 |
2025-11-11 15:20:37 | 2025-11-11 07:36:18 |
| NVD | nvd_CVE-2020-3261 |
2025-11-11 14:56:57 | 2025-11-11 07:44:43 |
| CNNVD | cnnvd_CNNVD-202004-1102 |
2025-11-11 15:10:25 | 2025-11-11 07:55:47 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 跨站请求伪造
- cnnvd_id: 未提取 -> CNNVD-202004-1102
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 35
- data_sources: ['cve'] -> ['cve', 'nvd']