#VU12790 Cross-site request forgery in Network Level Service


Published: 2018-05-17

Vulnerability identifier: #VU12790

Vulnerability risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-0270

CWE-ID: CWE-352

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Network Level Service
Client/Desktop applications / Software for system administration

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a remote unauthenticated attacker to write arbitrary files and cause DoS condition on the target system.

The weakness exists in the web-based management interface due to insufficient CSRF protections. A remote attacker can trick the victim into following a specially crafted link, perform arbitrary actions with the privilege level of the target user, write arbitrary files and cause he service to crash.

Mitigation
Update to version 4.2(0.83).

Vulnerable software versions

Network Level Service: 4.2.0.4


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-fnd


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability