{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T12:28:44.554","vulnerabilities":[{"cve":{"id":"CVE-2019-1713","sourceIdentifier":"psirt@cisco.com","published":"2019-05-03T17:29:00.453","lastModified":"2024-11-21T04:37:09.560","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the user has administrative privileges, the attacker could alter the configuration of, extract information from, or reload an affected device."},{"lang":"es","value":"Una vulnerabilidad en la interfaz de administración basada en web del software Adaptive Security Appliance (ASA) de Cisco, podría permitir a un atacante remoto no identificado dirigir un ataque de tipo cross-site request forgery (CSRF) en un sistema afectado. La vulnerabilidad es debido a las insuficientes protecciones de CSRF para la interfaz de administración basada en web en un dispositivo afectado. Un atacante podría aprovechar esta vulnerabilidad persuadiendo a un usuario de la interfaz a seguir un enlace malicioso. Una operación con éxito podría permitir al atacante ejecutar acciones arbitrarias con el nivel de privilegio del usuario afectado. Si el usuario tiene privilegios administrativos, el atacante podría alterar la configuración, extraer información o la recarga de un dispositivo afectado."}],"metrics":{"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionEndExcluding":"9.4.4.34","matchCriteriaId":"79F0345E-5661-4119-8620-8A1F42E97128"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.5","versionEndExcluding":"9.6.4.25","matchCriteriaId":"E7789E32-76B1-4D16-A556-B6B5A8CDB5A0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.7","versionEndExcluding":"9.8.4","matchCriteriaId":"C812C8D5-3159-434C-8B9F-8CB0A8767923"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.9","versionEndExcluding":"9.9.2.50","matchCriteriaId":"ABCD2AF8-97D4-45C6-B80E-D5FA9B719BD5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*","versionStartIncluding":"9.10","versionEndExcluding":"9.10.1.17","matchCriteriaId":"B4C6B343-2D4D-4C7E-A59E-629773DD2E60"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*","matchCriteriaId":"8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*","matchCriteriaId":"B091B9BA-D4CA-435B-8D66-602B45F0E0BD"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*","matchCriteriaId":"08F0F160-DAD2-48D4-B7B2-4818B2526F35"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*","matchCriteriaId":"977D597B-F6DE-4438-AB02-06BE64D71EBE"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*","matchCriteriaId":"2B387F62-6341-434D-903F-9B72E7F84ECB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*","matchCriteriaId":"EB71EB29-0115-4307-A9F7-262394FD9FB0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*","matchCriteriaId":"17C5A524-E1D9-480F-B655-0680AA5BF720"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*","matchCriteriaId":"57179F60-E330-4FF0-9664-B1E4637FF210"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*","matchCriteriaId":"E6287D95-F564-44B7-A0F9-91396D7C2C4E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*","matchCriteriaId":"5535C936-391B-4619-AA03-B35265FC15D7"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*","matchCriteriaId":"D1E828B8-5ECC-4A09-B2AD-DEDC558713DE"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*","matchCriteriaId":"16AE20C2-C77E-4E04-BF13-A48696E52426"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-csrf","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-csrf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}