ID

VAR-201609-0385


CVE

CVE-2016-1470


TITLE

Cisco Small Business 220 Series Smart Plus Switches Cross-Site Request Forgery Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2016-07071 // CNNVD: CNNVD-201608-538

DESCRIPTION

Cross-site request forgery (CSRF) vulnerability in the web-based management interface on Cisco Small Business 220 devices with firmware before 1.0.1.1 allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuz76230. Vendors have confirmed this vulnerability Bug ID CSCuz76230 It is released as.A third party may be able to hijack the authentication of any user. CiscoSmallBusiness220SeriesSmartPlusSwitches is a series of 220 series stackable managed switches from Cisco. A cross-site request forgery vulnerability exists in CiscoSmallBusiness220SeriesSmartPlusSwitches. An attacker could exploit the vulnerability to perform unauthorized actions. Other attacks are also possible. This issue is being tracked by Cisco Bug ID CSCuz76230

Trust: 2.52

sources: NVD: CVE-2016-1470 // JVNDB: JVNDB-2016-004517 // CNVD: CNVD-2016-07071 // BID: 92709 // VULHUB: VHN-90289

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-07071

AFFECTED PRODUCTS

vendor:ciscomodel:small business 220 series smart plus switchesscope:eqversion:1.0.0.17

Trust: 1.6

vendor:ciscomodel:small business 220 series smart plus switchesscope:eqversion:1.0.0.18

Trust: 1.6

vendor:ciscomodel:small business 220 series smart plus switchesscope:eqversion:1.0.0.19

Trust: 1.6

vendor:ciscomodel:small business 220 series smart plus switchscope:ltversion:1.0.1.1

Trust: 0.8

vendor:ciscomodel:small business series smart plus switchesscope:eqversion:2201.0.0.17

Trust: 0.6

vendor:ciscomodel:small business series smart plus switchesscope:eqversion:2201.0.0.18

Trust: 0.6

vendor:ciscomodel:small business series smart plus switchesscope:eqversion:2201.0.0.19

Trust: 0.6

vendor:ciscomodel:small business series smart plus switch orscope:eqversion:2201.0.0.19

Trust: 0.3

vendor:ciscomodel:small business series smart plus switchscope:eqversion:2201.0.0.18

Trust: 0.3

vendor:ciscomodel:small business series smart plus switchscope:eqversion:2201.0.0.17

Trust: 0.3

vendor:ciscomodel:small business series smart plus switchscope:neversion:2201.0.1.1

Trust: 0.3

sources: CNVD: CNVD-2016-07071 // BID: 92709 // JVNDB: JVNDB-2016-004517 // CNNVD: CNNVD-201608-538 // NVD: CVE-2016-1470

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1470
value: HIGH

Trust: 1.0

NVD: CVE-2016-1470
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-07071
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201608-538
value: MEDIUM

Trust: 0.6

VULHUB: VHN-90289
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-1470
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-07071
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90289
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1470
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-07071 // VULHUB: VHN-90289 // JVNDB: JVNDB-2016-004517 // CNNVD: CNNVD-201608-538 // NVD: CVE-2016-1470

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-90289 // JVNDB: JVNDB-2016-004517 // NVD: CVE-2016-1470

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201608-538

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201608-538

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004517

PATCH

title:cisco-sa-20160831-spsurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-sps

Trust: 0.8

title:Patch for CiscoSmallBusiness220SeriesSmartPlusSwitches Cross-Site Request Forgery Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/81032

Trust: 0.6

title:Cisco Small Business 220 Series Smart Plus Switches Fixes for cross-site request forgery vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63835

Trust: 0.6

sources: CNVD: CNVD-2016-07071 // JVNDB: JVNDB-2016-004517 // CNNVD: CNNVD-201608-538

EXTERNAL IDS

db:NVDid:CVE-2016-1470

Trust: 3.4

db:BIDid:92709

Trust: 2.6

db:SECTRACKid:1036722

Trust: 1.1

db:JVNDBid:JVNDB-2016-004517

Trust: 0.8

db:CNNVDid:CNNVD-201608-538

Trust: 0.7

db:CNVDid:CNVD-2016-07071

Trust: 0.6

db:NSFOCUSid:34713

Trust: 0.6

db:VULHUBid:VHN-90289

Trust: 0.1

sources: CNVD: CNVD-2016-07071 // VULHUB: VHN-90289 // BID: 92709 // JVNDB: JVNDB-2016-004517 // CNNVD: CNNVD-201608-538 // NVD: CVE-2016-1470

REFERENCES

url:http://www.securityfocus.com/bid/92709

Trust: 2.3

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160831-sps

Trust: 2.0

url:http://www.synacktiv.com/ressources/advisories_cisco_switch_sg220_csrf.pdf

Trust: 1.1

url:http://www.securitytracker.com/id/1036722

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1470

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1470

Trust: 0.8

url:http://www.nsfocus.net/vulndb/34713

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2016-07071 // VULHUB: VHN-90289 // BID: 92709 // JVNDB: JVNDB-2016-004517 // CNNVD: CNNVD-201608-538 // NVD: CVE-2016-1470

CREDITS

Nicolas Collignon and Renaud Dubourguais of Synacktiv.

Trust: 0.9

sources: BID: 92709 // CNNVD: CNNVD-201608-538

SOURCES

db:CNVDid:CNVD-2016-07071
db:VULHUBid:VHN-90289
db:BIDid:92709
db:JVNDBid:JVNDB-2016-004517
db:CNNVDid:CNNVD-201608-538
db:NVDid:CVE-2016-1470

LAST UPDATE DATE

2025-04-13T23:39:31.011000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-07071date:2016-09-02T00:00:00
db:VULHUBid:VHN-90289date:2017-08-13T00:00:00
db:BIDid:92709date:2016-08-31T00:00:00
db:JVNDBid:JVNDB-2016-004517date:2016-09-05T00:00:00
db:CNNVDid:CNNVD-201608-538date:2016-09-02T00:00:00
db:NVDid:CVE-2016-1470date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-07071date:2016-09-02T00:00:00
db:VULHUBid:VHN-90289date:2016-09-02T00:00:00
db:BIDid:92709date:2016-08-31T00:00:00
db:JVNDBid:JVNDB-2016-004517date:2016-09-05T00:00:00
db:CNNVDid:CNNVD-201608-538date:2016-08-31T00:00:00
db:NVDid:CVE-2016-1470date:2016-09-02T00:59:00.137