Cisco Unified Computing System Fabric Interconnect Cross-Site Request Forgery Vulnerability

Cisco-SA-20131009-CVE-2012-4084 · Medium · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

A vulnerability in the fabric interconnect (FI) web management interface of the Cisco Unified Computing System could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks. The vulnerability occurs because the web interface relies on cookies to authenticate URL-based commands. An attacker could exploit this vulnerability by persuading the user to follow a malicious link or visit an attacker-controlled website while authenticated to the FI web management interface. A successful exploit could allow the attacker to perform various activities as the affected user. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to run both firewall and antivirus applications to minimize the potential of inbound and outbound threats.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators can help protect affected systems from external attacks by using a solid firewall strategy.

Users are advised not to open email messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in email messages are safe, they are advised not to open them.

Users are advised not to open unsolicited email attachments.

Users are advised not to visit websites or follow links that have suspicious characteristics or cannot be verified as safe.

Administrators are advised to monitor affected systems.

CVEsCVE-2012-4084
Cisco Bug IDsCSCtg20755
CVSS ScoreBase 4.3
Base 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N/E:F/RL:U/RC:C

Products with public affected evidence