Логотип exploitDog
bind:CVE-2020-3531
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3531

Количество 3

Количество 3

nvd логотип

CVE-2020-3531

около 5 лет назад

A vulnerability in the REST API of Cisco IoT Field Network Director (FND) could allow an unauthenticated, remote attacker to access the back-end database of an affected system. The vulnerability exists because the affected software does not properly authenticate REST API calls. An attacker could exploit this vulnerability by obtaining a cross-site request forgery (CSRF) token and then using the token with REST API requests. A successful exploit could allow the attacker to access the back-end database of the affected device and read, alter, or drop information.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-fg87-2627-3rxj

больше 3 лет назад

A vulnerability in the REST API of Cisco IoT Field Network Director (FND) could allow an unauthenticated, remote attacker to access the back-end database of an affected system. The vulnerability exists because the affected software does not properly authenticate REST API calls. An attacker could exploit this vulnerability by obtaining a cross-site request forgery (CSRF) token and then using the token with REST API requests. A successful exploit could allow the attacker to access the back-end database of the affected device and read, alter, or drop information.

EPSS: Низкий
fstec логотип

BDU:2020-05485

около 5 лет назад

Уязвимость интерфейса REST API программного средства управления сетью Cisco IoT Field Network Director, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации, доступ на чтение, изменение или удаление данных

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3531

A vulnerability in the REST API of Cisco IoT Field Network Director (FND) could allow an unauthenticated, remote attacker to access the back-end database of an affected system. The vulnerability exists because the affected software does not properly authenticate REST API calls. An attacker could exploit this vulnerability by obtaining a cross-site request forgery (CSRF) token and then using the token with REST API requests. A successful exploit could allow the attacker to access the back-end database of the affected device and read, alter, or drop information.

CVSS3: 9.8
5%
Низкий
около 5 лет назад
github логотип
GHSA-fg87-2627-3rxj

A vulnerability in the REST API of Cisco IoT Field Network Director (FND) could allow an unauthenticated, remote attacker to access the back-end database of an affected system. The vulnerability exists because the affected software does not properly authenticate REST API calls. An attacker could exploit this vulnerability by obtaining a cross-site request forgery (CSRF) token and then using the token with REST API requests. A successful exploit could allow the attacker to access the back-end database of the affected device and read, alter, or drop information.

5%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-05485

Уязвимость интерфейса REST API программного средства управления сетью Cisco IoT Field Network Director, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации, доступ на чтение, изменение или удаление данных

CVSS3: 9.8
5%
Низкий
около 5 лет назад

Уязвимостей на страницу