BDU:2024-07914
Vulnerability from fstec - Published: 08.11.2023
VLAI Severity ?
Title
Уязвимость веб-интерфейса управления операционных систем Cisco IOS XE, позволяющая нарушителю осуществить CSRF-атаку
Description
Уязвимость веб-интерфейса управления операционных систем Cisco IOS XE связана с подделкой межсайтовых запросов. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, осуществить CSRF-атаку
Severity ?
Vendor
Cisco Systems Inc.
Software Name
Cisco IOS XE
Software Version
17.6.1 (Cisco IOS XE), 17.9.1 (Cisco IOS XE), 17.9.1a (Cisco IOS XE), 17.9.1w (Cisco IOS XE), 17.11.1 (Cisco IOS XE), 17.11.1a (Cisco IOS XE), 17.12.1 (Cisco IOS XE), 17.12.1w (Cisco IOS XE), 17.12.1a (Cisco IOS XE), 17.11.99SW (Cisco IOS XE), 17.10.1 (Cisco IOS XE), 17.10.1a (Cisco IOS XE), 17.10.1b (Cisco IOS XE), 17.8.1 (Cisco IOS XE), 17.9.2 (Cisco IOS XE), 17.9.3 (Cisco IOS XE), 17.9.4 (Cisco IOS XE), 17.9.4a (Cisco IOS XE), 17.7.1 (Cisco IOS XE), 17.6.5a (Cisco IOS XE), 17.6.6a (Cisco IOS XE), 17.6.6 (Cisco IOS XE), 17.6.2 (Cisco IOS XE), 17.6.3 (Cisco IOS XE), 17.6.4 (Cisco IOS XE), 17.6.5 (Cisco IOS XE), 17.3.2 (Cisco IOS XE), 17.3.3 (Cisco IOS XE), 17.3.2a (Cisco IOS XE), 17.3.4 (Cisco IOS XE), 17.3.5 (Cisco IOS XE), 17.3.6 (Cisco IOS XE), 17.3.4c (Cisco IOS XE), 17.3.5a (Cisco IOS XE), 17.3.5b (Cisco IOS XE), 17.3.7 (Cisco IOS XE), 17.3.8 (Cisco IOS XE), 17.3.8a (Cisco IOS XE), 17.4.1 (Cisco IOS XE), 17.5.1 (Cisco IOS XE), 17.3.3a (Cisco IOS XE), 17.3.4a (Cisco IOS XE), 17.3.4b (Cisco IOS XE), 17.4.1a (Cisco IOS XE), 17.4.1b (Cisco IOS XE), 17.4.1c (Cisco IOS XE), 17.4.2 (Cisco IOS XE), 17.4.2a (Cisco IOS XE), 17.5.1a (Cisco IOS XE), 17.5.1b (Cisco IOS XE), 17.5.1c (Cisco IOS XE), 17.6.1a (Cisco IOS XE), 17.6.3a (Cisco IOS XE), 17.7.1a (Cisco IOS XE), 17.7.1b (Cisco IOS XE), 17.7.2 (Cisco IOS XE), 17.8.1a (Cisco IOS XE), 17.9.2a (Cisco IOS XE), 17.9.3a (Cisco IOS XE), 17.6.1w (Cisco IOS XE), 17.6.1x (Cisco IOS XE), 17.6.1y (Cisco IOS XE), 17.6.1z (Cisco IOS XE), 17.6.1z1 (Cisco IOS XE), 17.9.1x (Cisco IOS XE), 17.9.1y (Cisco IOS XE), 17.9.1x1 (Cisco IOS XE), 17.9.1y1 (Cisco IOS XE), 17.12.1x (Cisco IOS XE), 17.12.1y (Cisco IOS XE), 17.12.1z2 (Cisco IOS XE)
Possible Mitigations
Использование рекомендаций производителя:
https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-webui-csrf-ycUYxkKO.html
Reference
https://nvd.nist.gov/vuln/detail/CVE-2024-20437
https://vuldb.com/?id.278494
https://www.cve.org/CVERecord?id=CVE-2024-20437
https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-webui-csrf-ycUYxkKO.html
CWE
CWE-352
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "17.6.1 (Cisco IOS XE), 17.9.1 (Cisco IOS XE), 17.9.1a (Cisco IOS XE), 17.9.1w (Cisco IOS XE), 17.11.1 (Cisco IOS XE), 17.11.1a (Cisco IOS XE), 17.12.1 (Cisco IOS XE), 17.12.1w (Cisco IOS XE), 17.12.1a (Cisco IOS XE), 17.11.99SW (Cisco IOS XE), 17.10.1 (Cisco IOS XE), 17.10.1a (Cisco IOS XE), 17.10.1b (Cisco IOS XE), 17.8.1 (Cisco IOS XE), 17.9.2 (Cisco IOS XE), 17.9.3 (Cisco IOS XE), 17.9.4 (Cisco IOS XE), 17.9.4a (Cisco IOS XE), 17.7.1 (Cisco IOS XE), 17.6.5a (Cisco IOS XE), 17.6.6a (Cisco IOS XE), 17.6.6 (Cisco IOS XE), 17.6.2 (Cisco IOS XE), 17.6.3 (Cisco IOS XE), 17.6.4 (Cisco IOS XE), 17.6.5 (Cisco IOS XE), 17.3.2 (Cisco IOS XE), 17.3.3 (Cisco IOS XE), 17.3.2a (Cisco IOS XE), 17.3.4 (Cisco IOS XE), 17.3.5 (Cisco IOS XE), 17.3.6 (Cisco IOS XE), 17.3.4c (Cisco IOS XE), 17.3.5a (Cisco IOS XE), 17.3.5b (Cisco IOS XE), 17.3.7 (Cisco IOS XE), 17.3.8 (Cisco IOS XE), 17.3.8a (Cisco IOS XE), 17.4.1 (Cisco IOS XE), 17.5.1 (Cisco IOS XE), 17.3.3a (Cisco IOS XE), 17.3.4a (Cisco IOS XE), 17.3.4b (Cisco IOS XE), 17.4.1a (Cisco IOS XE), 17.4.1b (Cisco IOS XE), 17.4.1c (Cisco IOS XE), 17.4.2 (Cisco IOS XE), 17.4.2a (Cisco IOS XE), 17.5.1a (Cisco IOS XE), 17.5.1b (Cisco IOS XE), 17.5.1c (Cisco IOS XE), 17.6.1a (Cisco IOS XE), 17.6.3a (Cisco IOS XE), 17.7.1a (Cisco IOS XE), 17.7.1b (Cisco IOS XE), 17.7.2 (Cisco IOS XE), 17.8.1a (Cisco IOS XE), 17.9.2a (Cisco IOS XE), 17.9.3a (Cisco IOS XE), 17.6.1w (Cisco IOS XE), 17.6.1x (Cisco IOS XE), 17.6.1y (Cisco IOS XE), 17.6.1z (Cisco IOS XE), 17.6.1z1 (Cisco IOS XE), 17.9.1x (Cisco IOS XE), 17.9.1y (Cisco IOS XE), 17.9.1x1 (Cisco IOS XE), 17.9.1y1 (Cisco IOS XE), 17.12.1x (Cisco IOS XE), 17.12.1y (Cisco IOS XE), 17.12.1z2 (Cisco IOS XE)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-webui-csrf-ycUYxkKO.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "08.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "10.10.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "10.10.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-07914",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-20437",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Cisco IOS XE",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Cisco Systems Inc. Cisco IOS XE 17.6.1 , Cisco Systems Inc. Cisco IOS XE 17.9.1 , Cisco Systems Inc. Cisco IOS XE 17.9.1a , Cisco Systems Inc. Cisco IOS XE 17.9.1w , Cisco Systems Inc. Cisco IOS XE 17.11.1 , Cisco Systems Inc. Cisco IOS XE 17.11.1a , Cisco Systems Inc. Cisco IOS XE 17.12.1 , Cisco Systems Inc. Cisco IOS XE 17.12.1w , Cisco Systems Inc. Cisco IOS XE 17.12.1a , Cisco Systems Inc. Cisco IOS XE 17.11.99SW , Cisco Systems Inc. Cisco IOS XE 17.10.1 , Cisco Systems Inc. Cisco IOS XE 17.10.1a , Cisco Systems Inc. Cisco IOS XE 17.10.1b , Cisco Systems Inc. Cisco IOS XE 17.8.1 , Cisco Systems Inc. Cisco IOS XE 17.9.2 , Cisco Systems Inc. Cisco IOS XE 17.9.3 , Cisco Systems Inc. Cisco IOS XE 17.9.4 , Cisco Systems Inc. Cisco IOS XE 17.9.4a , Cisco Systems Inc. Cisco IOS XE 17.7.1 , Cisco Systems Inc. Cisco IOS XE 17.6.5a , Cisco Systems Inc. Cisco IOS XE 17.6.6a , Cisco Systems Inc. Cisco IOS XE 17.6.6 , Cisco Systems Inc. Cisco IOS XE 17.6.2 , Cisco Systems Inc. Cisco IOS XE 17.6.3 , Cisco Systems Inc. Cisco IOS XE 17.6.4 , Cisco Systems Inc. Cisco IOS XE 17.6.5 , Cisco Systems Inc. Cisco IOS XE 17.3.2 , Cisco Systems Inc. Cisco IOS XE 17.3.3 , Cisco Systems Inc. Cisco IOS XE 17.3.2a , Cisco Systems Inc. Cisco IOS XE 17.3.4 , Cisco Systems Inc. Cisco IOS XE 17.3.5 , Cisco Systems Inc. Cisco IOS XE 17.3.6 , Cisco Systems Inc. Cisco IOS XE 17.3.4c , Cisco Systems Inc. Cisco IOS XE 17.3.5a , Cisco Systems Inc. Cisco IOS XE 17.3.5b , Cisco Systems Inc. Cisco IOS XE 17.3.7 , Cisco Systems Inc. Cisco IOS XE 17.3.8 , Cisco Systems Inc. Cisco IOS XE 17.3.8a , Cisco Systems Inc. Cisco IOS XE 17.4.1 , Cisco Systems Inc. Cisco IOS XE 17.5.1 , Cisco Systems Inc. Cisco IOS XE 17.3.3a , Cisco Systems Inc. Cisco IOS XE 17.3.4a , Cisco Systems Inc. Cisco IOS XE 17.3.4b , Cisco Systems Inc. Cisco IOS XE 17.4.1a , Cisco Systems Inc. Cisco IOS XE 17.4.1b , Cisco Systems Inc. Cisco IOS XE 17.4.1c , Cisco Systems Inc. Cisco IOS XE 17.4.2 , Cisco Systems Inc. Cisco IOS XE 17.4.2a , Cisco Systems Inc. Cisco IOS XE 17.5.1a , Cisco Systems Inc. Cisco IOS XE 17.5.1b , Cisco Systems Inc. Cisco IOS XE 17.5.1c , Cisco Systems Inc. Cisco IOS XE 17.6.1a , Cisco Systems Inc. Cisco IOS XE 17.6.3a , Cisco Systems Inc. Cisco IOS XE 17.7.1a , Cisco Systems Inc. Cisco IOS XE 17.7.1b , Cisco Systems Inc. Cisco IOS XE 17.7.2 , Cisco Systems Inc. Cisco IOS XE 17.8.1a , Cisco Systems Inc. Cisco IOS XE 17.9.2a , Cisco Systems Inc. Cisco IOS XE 17.9.3a , Cisco Systems Inc. Cisco IOS XE 17.6.1w , Cisco Systems Inc. Cisco IOS XE 17.6.1x , Cisco Systems Inc. Cisco IOS XE 17.6.1y , Cisco Systems Inc. Cisco IOS XE 17.6.1z , Cisco Systems Inc. Cisco IOS XE 17.6.1z1 , Cisco Systems Inc. Cisco IOS XE 17.9.1x , Cisco Systems Inc. Cisco IOS XE 17.9.1y , Cisco Systems Inc. Cisco IOS XE 17.9.1x1 , Cisco Systems Inc. Cisco IOS XE 17.9.1y1 , Cisco Systems Inc. Cisco IOS XE 17.12.1x , Cisco Systems Inc. Cisco IOS XE 17.12.1y , Cisco Systems Inc. Cisco IOS XE 17.12.1z2 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Cisco IOS XE, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0438\u0442\u044c CSRF-\u0430\u0442\u0430\u043a\u0443",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041c\u0435\u0436\u0441\u0430\u0439\u0442\u043e\u0432\u0430\u044f \u0444\u0430\u043b\u044c\u0441\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 (CWE-352)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Cisco IOS XE \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u043e\u0434\u0434\u0435\u043b\u043a\u043e\u0439 \u043c\u0435\u0436\u0441\u0430\u0439\u0442\u043e\u0432\u044b\u0445 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0438\u0442\u044c CSRF-\u0430\u0442\u0430\u043a\u0443",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "\u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Cisco, \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0442 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Cisco IOS XE \u0438 \u0435\u0441\u043b\u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u044f HTTP-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u0430 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0439 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0441\u043b\u0443\u0436\u0431\u044b.\n\n\u0427\u0442\u043e\u0431\u044b \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0438\u0442\u044c, \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u0430 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0439 \u043e\u0442\u043b\u0430\u0434\u043a\u0438 \u0441\u0435\u0440\u0432\u0438\u0441\u0430 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430, \u0432\u043e\u0439\u0434\u0438\u0442\u0435 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435 \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0439\u0442\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u0443 show running-config | include service internal \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u043a\u0435, \u0447\u0442\u043e\u0431\u044b \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0439 \u043e\u0442\u043b\u0430\u0434\u043a\u0438 \u0441\u0435\u0440\u0432\u0438\u0441\u0430 \u0432 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u043e\u0439 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438. \u041a\u043e\u043c\u0430\u043d\u0434\u0430 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0439 \u043e\u0442\u043b\u0430\u0434\u043a\u0438 \u0441\u0435\u0440\u0432\u0438\u0441\u0430 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u043d\u0435 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430.\n\nRouter# show running-config | include service internal\nservice internal\nRouter#",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041f\u043e\u0434\u043c\u0435\u043d\u0430 \u043f\u0440\u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2024-20437\nhttps://vuldb.com/?id.278494\nhttps://www.cve.org/CVERecord?id=CVE-2024-20437\nhttps://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-webui-csrf-ycUYxkKO.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-352",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,4)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,1)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…