
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN205
_____________________________________________________________________

DATE                : 16/04/2020

HARDWARE PLATFORM(S): Cisco Aironet 1540 Series Access Points,
                      Cisco Aironet 1560 Series Access Points,
                      Cisco Aironet 1800 Series Access Points,
                      Cisco Aironet 2800 Series Access Points,
                      Cisco Aironet 3800 Series Access Points,
                      Cisco Aironet 4800 Series Access Points,
                      Cisco Catalyst IW6300 Access Points,
                      Cisco 6300 Embedded Services Access Points.

OPERATING SYSTEM(S): Cisco Mobility Express Software versions prior to
                             8.5.161.0, 8.8.130.0, 8.10.121.0.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mob-exp-csrf-b8tFec24
_____________________________________________________________________

Cisco Mobility Express Software Cross-Site Request Forgery Vulnerability

Priority:        High

Advisory ID:     cisco-sa-mob-exp-csrf-b8tFec24

First Published: 2020 April 15 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds available

Cisco Bug IDs:   CSCvq88209

CVE-2020-3261

CWE-352

CVSS Score:
8.1  AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:X/RL:X/RC:X


Summary

  o A vulnerability in the web-based management interface of Cisco
    Mobility Express Software could allow an unauthenticated, remote
    attacker to conduct a cross-site request forgery (CSRF) attack on an
    affected system.

    The vulnerability is due to insufficient CSRF protections for the
    web-based management interface on an affected device. An attacker
    could exploit this vulnerability by persuading a user with an active
    session on an affected device to follow a malicious link. A
    successful exploit could allow the attacker to perform arbitrary
    actions, including modifying the configuration, with the privilege
    level of the user.

    Cisco has released software updates that address this vulnerability.
    There are no workarounds that address this vulnerability.

    This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mob-exp-csrf-b8tFec24

    This advisory is part of the April 2020 Cisco Aironet AP, Mobility
    Express, and WLC Software Security Advisory Bundled Publication,
    which includes four Cisco Security Advisories that describe four
    vulnerabilities. For a complete list of the advisories and links to
    them, see Cisco Event Response: April 2020 Cisco Aironet AP,
    Mobility Express and WLC Software Security Advisory Bundled
    Publication .


Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are
    running a vulnerable release of Cisco Mobility Express Software:

       Aironet 1540 Series Access Points
       Aironet 1560 Series Access Points
       Aironet 1800 Series Access Points
       Aironet 2800 Series Access Points
       Aironet 3800 Series Access Points
       Aironet 4800 Series Access Points
       Catalyst IW6300 Access Points
       6300 Embedded Services Access Points

    For more information about which Cisco software releases are
    vulnerable, see the Fixed Software section of this advisory.


    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this
    advisory are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect Cisco
    Catalyst 9100 Series Access Points.


Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the
    vulnerability described in this advisory. Customers may only install
    and expect support for software versions and feature sets for which
    they have purchased a license. By installing, downloading,
    accessing, or otherwise using such software upgrades, customers
    agree to follow the terms of the Cisco software license:
https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they
    have a valid license, procured from Cisco directly, or through a
    Cisco authorized reseller or partner. In most cases this will be a
    maintenance upgrade to software that was previously purchased. Free
    security software updates do not entitle customers to a new software
    license, additional software feature sets, or major revision
    upgrades.

    When considering software upgrades , customers are advised to
    regularly consult the advisories for Cisco products, which are
    available from the Cisco Security Advisories and Alerts page , to
    determine exposure and a complete upgrade solution.

    In all cases, customers should ensure that the devices to be
    upgraded contain sufficient memory and confirm that current hardware
    and software configurations will continue to be supported properly
    by the new release.
    If the information is not clear, customers are advised to contact
    the Cisco Technical Assistance Center (TAC) or their contracted
    maintenance providers.


    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco
    service contract and customers who make purchases through
    third-party vendors but are unsuccessful in obtaining fixed software
    through their point of sale should obtain upgrades by contacting the
    Cisco TAC:
https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be
    prepared to provide the URL of this advisory as evidence of
    entitlement to a free upgrade.

    Fixed Releases

    In the following table, the left column lists Cisco software
    releases. The center column indicates whether a release is affected
    by the vulnerability described in this advisory and the first
    release that includes the fix for this vulnerability. The right
    column indicates whether a release is affected by all the
    vulnerabilities described in this bundle of advisories and which
    release includes fixes for those vulnerabilities.

    Cisco Mobility       First Fixed        Recommended Release for All
    Express Major        Release for This   Vulnerabilities Described in
                                            This
    Software Release     Vulnerability      Bundle of Advisories
    8.0 and earlier      Not vulnerable ^1  Not vulnerable ^1
    8.1                  8.8.130.0          8.5.161.0 ^2
    8.2                  8.8.130.0          8.5.161.0 ^2
    8.3                  8.8.130.0          8.5.161.0 ^2
    8.4                  8.8.130.0          8.5.161.0 ^2
    8.5                  8.8.130.0          8.5.161.0 ^2
    8.6                  8.8.130.0          8.8.130.0
    8.7                  8.8.130.0          8.8.130.0
    8.8                  8.8.130.0          8.8.130.0
    8.9                  8.10.121.0         8.10.121.0
    8.10                 8.10.121.0         8.10.121.0

    1. Mobility Express is not supported in releases 8.0 and earlier.
    2. If the deployment is based on a Mobility Express controller,
       Cisco recommends migrating to Release 8.8.130.0.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not
    aware of any public announcements or malicious use of the
    vulnerability that is described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document
    also contains instructions for obtaining fixed software and
    receiving security vulnerability information from Cisco.

Related to This Advisory

  o April 2020 Cisco Aironet AP, Mobility Express, and WLC Software
    Security Advisory Bundled Publication

URL

  o
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mob-exp-csrf-b8tFec24


Revision History

  o
+----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |
Date     |

+----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  |
2020-APR-15  |

+----------+---------------------------+----------+--------+--------------+


=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================




