A vulnerability in the REST API of Cisco IoT Field Network Director (FND) could allow an unauthenticated, remote attacker to access the back-end database of an affected system. The vulnerability exists because the affected software does not properly authenticate REST API calls. An attacker could exploit this vulnerability by obtaining a cross-site request forgery (CSRF) token and then using the token with REST API requests. A successful exploit could allow the attacker to access the back-end database of the affected device and read, alter, or drop information.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-BCK-GHkPNZ5F | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2020-11-18 19:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-3531
Mitre link : CVE-2020-3531
CVE.ORG link : CVE-2020-3531
JSON object : View
Products Affected
cisco
- iot_field_network_director
CWE
CWE-306
Missing Authentication for Critical Function