Lucene search

K
ciscoCiscoCISCO-SA-SMB-SWITCHES-TOKENS-UZWPR4E5
HistoryNov 03, 2021 - 4:00 p.m.

Cisco Small Business Series Switches Session Credentials Replay Vulnerability

2021-11-0316:00:00
tools.cisco.com
21

0.003 Low

EPSS

Percentile

69.8%

A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device.

This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5”]

Affected configurations

Vulners
Node
ciscosmall_business_220_series_smart_plus_switchesMatchany
OR
ciscosmall_business_220_series_smart_plus_switchesMatchany

0.003 Low

EPSS

Percentile

69.8%

Related for CISCO-SA-SMB-SWITCHES-TOKENS-UZWPR4E5