Guest

Preview Tool

Cisco Bug: CSCur25585 - Cisco Headend Digital Broadband Delivery System CSRF Vulnerability

Last Modified

Jun 23, 2020

Products (1)

  • Headend System Releases

Known Affected Releases

dncs-7.0.0.12

Description (partial)

Symptom:
A vulnerability in Cisco Headend Digital Broadband Delivery could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attacks on the affected device.

The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. A successful exploit could allow the attacker to submit arbitrary requests to the affected device via the web browser with the privileges of the user.

Cisco has confirmed the vulnerability and released updated software.

To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.

Devices running a default configuration of an affected version of software are vulnerable.

This security advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20150601-CVE-2015-0759

Conditions:
Device running with default configuration running an affected version of software.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.