First published: Thu Jul 28 2011(Updated: )
SQL injection vulnerability in the web-based management interface on Cisco SA 500 series security appliances with software before 2.1.19 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCtq65669.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Software | <=2.1.18 | |
Cisco Software | =1.0.14 | |
Cisco Software | =1.0.15 | |
Cisco Software | =1.0.17 | |
Cisco Software | =1.0.39 | |
Cisco Software | =1.1.21 | |
Cisco Software | =1.1.42 | |
Cisco Software | =1.1.65 | |
Cisco SA520W | ||
Cisco SA520W | ||
Cisco SA540 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2546 is classified as a critical vulnerability, allowing remote attackers to execute arbitrary SQL commands.
To fix CVE-2011-2546, upgrade to the Cisco SA 500 series software version 2.1.19 or later.
CVE-2011-2546 affects Cisco SA 500 series security appliances running software before version 2.1.19.
CVE-2011-2546 enables remote SQL injection attacks that could compromise the integrity of the database.
No, user authentication is not required to exploit CVE-2011-2546, making it particularly dangerous.