Cisco Adaptive Security Appliance Software CSRF (cisco-sa-20190501-asa-csrf)

High Nessus Plugin ID 136768


The remote device is missing a vendor-supplied security patch.


According to its self-reported version, Cisco Adaptive Security Appliance (ASA) Software is affected by a cross-site request forgery (CSRF) attack in the web-based management interface due to insufficient CSRF protections. An unauthenticated, remote attacker can exploit this, by persuading a user of the interface to follow a malicious link, to allow the attacker allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the user has administrative privileges, the attacker could alter the configuration of, extract information from, or reload an affected device.

Please see the included Cisco BID and Cisco Security Advisory for more information.


Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvj34599

See Also

Plugin Details

Severity: High

ID: 136768

File Name: cisco-sa-20190501-asa-csrf.nasl

Version: 1.4

Type: local

Family: CISCO

Published: 2020/05/22

Updated: 2020/05/27

Dependencies: 12634, 11936

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2019-1713

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:adaptive_security_appliance_software

Required KB Items: Host/Cisco/ASA

Exploit Ease: No known exploits are available

Patch Publication Date: 2019/05/01

Vulnerability Publication Date: 2019/05/01

Reference Information

CVE: CVE-2019-1713

BID: 108132


CISCO-SA: cisco-sa-20190501-asa-csrf

CWE: 352