First published: Tue Aug 17 2010(Updated: )
SQL injection vulnerability in Cisco Wireless Control System (WCS) 6.0.x before 6.0.196.0 allows remote authenticated users to execute arbitrary SQL commands via vectors related to the ORDER BY clause of the Client List screens, aka Bug ID CSCtf37019.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless Control System Software | =6.0 | |
Cisco Wireless Control System Software | =6.0.170.0 | |
Cisco Wireless Control System Software | =6.0.132.0 | |
Cisco Wireless Control System Software | =6.0.181.0 | |
Cisco Wireless Control System Software | =6.0.182.0 | |
Cisco Wireless Control System Software | <=6.0.188.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2826 is categorized as a moderate severity vulnerability due to the potential for remote authenticated SQL injection attacks.
To fix CVE-2010-2826, upgrade your Cisco Wireless Control System software to version 6.0.196.0 or later.
CVE-2010-2826 affects Cisco Wireless Control System Software versions 6.0.x before 6.0.196.0.
No, CVE-2010-2826 requires remote authenticated access to exploit the SQL injection vulnerability.
CVE-2010-2826 allows attackers to execute arbitrary SQL commands, potentially compromising the database integrity.