Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Title Cisco Prime Infrastructure and Evolved Programmable Network Manager SQL Injection Vulnerabilities
Name cisco-sa-20190515-pi-sqlinject First vendor Publication 2019-05-15
Vendor Cisco Last vendor Modification 2019-05-15
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:N)
Cvss Base Score 5.5 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores


Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute arbitrary SQL queries.

These vulnerabilities exist because the software improperly validates user-supplied input in SQL queries. An attacker could exploit these vulnerabilities by sending a crafted HTTP request that contains malicious SQL statements to the affected application. A successful exploit could allow the attacker to view or modify entries in some database tables, affecting the integrity of the data.

Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-sqlinject ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-sqlinject"]


iQJ5BAEBAgBjBQJc3Dq1XBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczLmIQAJgDMDkcNBXNZRcRo9pq8ue3mrz9 fxw+Avk2uaBZxWydz11SUVdCGVzAXMgooNZ3NQmISiiqvT40VQVDMdN2QK0IdUJH oCPV05/xFQywyB9loV6F8hLOyg/6XXSgVIYzHZdJiHTPbrrodTooRSS8CuRXPco6 6DAWDKblAB+n1WsmEOo4SGaX9oUAXcaLv/nITS9e+YBAqXCOyamUkPhA1nQFUccf 1lJZS2oiE+fgQu15jHs9B2IuHxrvnpi99c0i4SEQH/PfiswQyyIOwZ7rI9o1+P7U FIBHmq0QA0h23elECaurkeAaAqVB9tSINv8MJzGIIWp/5Ybaf/gI7hYXSM7QBxTP Qr7wgwwa77IPTx0yzkTRkCY08w1jF+fC/2bfpHbcd+CYCkyNsrtu6+xXKIoROQrk XkJNNi6FPCbxbu2HIZjhsnxWWSNyCQfxYnF0PBqz3tLKLoz9/t7zirpdysbW3V4i LvjQL2hhP18YMbR592taKrAk5OY8Hm4GZFz9DRNXWupYAr4ick0owrqXEX6+wY0B hZOrVTRzg/f41FUvxKvFi2ZyucqqHl72r+wjNEGjIEDMFzktHDRQUDeehSn7gjTC nPm3C1ASqYDWYn9IjmhRLpOiFeXupJ7kIHS1jEKniqgWYEv/OdlmmHyXB3KkKkxU Jf3Iwhk5yX7Vygly =mwDd END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

Application 29
Application 1
Application 71

Alert History

If you want to see full details history, please login or register.
Date Informations
2019-05-21 00:21:32
  • Multiple Updates
2019-05-16 09:21:38
  • Multiple Updates
2019-05-15 21:18:32
  • First insertion