CVE-2015-2805
Published Jun 16, 2015
Last updated 6 years ago
Overview
- Description
- Cross-site request forgery (CSRF) vulnerability in sec/content/sec_asa_users_local_db_add.html in the management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, 6850E, 9000E, 6400, 6855, 6900, 10K, and 6860 with firmware 6.4.5.R02, 6.4.6.R01, 6.6.4.R01, 6.6.5.R02, 7.3.2.R01, 7.3.3.R01, 7.3.4.R01, and 8.1.1.R01 allows remote attackers to hijack the authentication of administrators for requests that create users via a crafted request.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-352
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "146D0494-CC3B-47E9-8798-631AA8015A73", "versionEndIncluding": "6.4.5.r02" }, { "criteria": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B629D98-2C6F-4937-A3B3-CD3FEE2B61FD", "versionEndIncluding": "6.4.6.r01" }, { "criteria": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8CE49B7-937F-4CEE-9A3D-1D94C6A0C0FE", "versionEndIncluding": "6.6.4.r01" }, { "criteria": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB4AC6CF-716C-4A40-B0BB-8C652565FD52", "versionEndIncluding": "6.6.5.r02" }, { "criteria": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB40E084-75AF-4851-A2DC-A9D6C175C1E4", "versionEndIncluding": "7.3.2.r01" }, { "criteria": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F70B59CA-426A-49A1-BD75-516FBC0A4935", "versionEndIncluding": "7.3.3.r01" }, { "criteria": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C61B0959-BF8F-4645-9690-B5E7D43CD0D1", "versionEndIncluding": "7.3.4.r01" }, { "criteria": "cpe:2.3:o:alcatel-lucent:omniswitch_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B01558D-907A-4746-A09C-5761A6EE5B8C", "versionEndIncluding": "8.1.1.r01" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:alcatel-lucent:omniswitch_10k:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F7C154AC-D64C-4CB0-99E6-1792B23237BE" }, { "criteria": "cpe:2.3:h:alcatel-lucent:omniswitch_6250:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CC17F6AB-A4A7-4DCF-A38D-567A626BAC9D" }, { "criteria": "cpe:2.3:h:alcatel-lucent:omniswitch_6400:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6E628D41-4AC8-4C60-8353-028588BAE9C0" }, { "criteria": "cpe:2.3:h:alcatel-lucent:omniswitch_6450:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A4D9AB0D-317D-4147-B944-02922FC3E14A" }, { "criteria": "cpe:2.3:h:alcatel-lucent:omniswitch_6850e:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2026FD8F-2734-4927-AE3D-F346B6A3F7DD" }, { "criteria": "cpe:2.3:h:alcatel-lucent:omniswitch_6855:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9CA46E94-6195-4AD9-A6C1-97F309D57614" }, { "criteria": "cpe:2.3:h:alcatel-lucent:omniswitch_6860:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E6558791-5C3C-451C-B8C9-498A27555248" }, { "criteria": "cpe:2.3:h:alcatel-lucent:omniswitch_6900:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C314BC45-D037-4FD9-B893-A737358EA851" }, { "criteria": "cpe:2.3:h:alcatel-lucent:omniswitch_9000e:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "30CE6E3F-9C8A-4EC8-9DF5-DA618C4985C6" } ], "operator": "OR" } ], "operator": "AND" } ]