First published: Thu Jul 18 2013(Updated: )
SQL injection vulnerability in Cisco Unified Communications Manager (CUCM) 7.1(x) through 9.1(2) allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCuh81766.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager | =7.1\(2a\) | |
Cisco Unified Communications Manager | =7.1\(2a\)su1 | |
Cisco Unified Communications Manager | =7.1\(2b\) | |
Cisco Unified Communications Manager | =7.1\(2b\)su1 | |
Cisco Unified Communications Manager | =7.1\(3\) | |
Cisco Unified Communications Manager | =7.1\(3a\) | |
Cisco Unified Communications Manager | =7.1\(3a\)su1 | |
Cisco Unified Communications Manager | =7.1\(3a\)su1a | |
Cisco Unified Communications Manager | =7.1\(3b\) | |
Cisco Unified Communications Manager | =7.1\(3b\)su1 | |
Cisco Unified Communications Manager | =7.1\(3b\)su2 | |
Cisco Unified Communications Manager | =7.1\(5\) | |
Cisco Unified Communications Manager | =7.1\(5\)su1 | |
Cisco Unified Communications Manager | =7.1\(5\)su1a | |
Cisco Unified Communications Manager | =7.1\(5a\) | |
Cisco Unified Communications Manager | =7.1\(5b\) | |
Cisco Unified Communications Manager | =7.1\(5b\)su1 | |
Cisco Unified Communications Manager | =7.1\(5b\)su1a | |
Cisco Unified Communications Manager | =7.1\(5b\)su2 | |
Cisco Unified Communications Manager | =7.1\(5b\)su3 | |
Cisco Unified Communications Manager | =7.1\(5b\)su4 | |
Cisco Unified Communications Manager | =7.1\(5b\)su5 | |
Cisco Unified Communications Manager | =7.1\(5b\)su6 | |
Cisco Unified Communications Manager | =8.0 | |
Cisco Unified Communications Manager | =8.0\(1\) | |
Cisco Unified Communications Manager | =8.0\(2\) | |
Cisco Unified Communications Manager | =8.0\(2a\) | |
Cisco Unified Communications Manager | =8.0\(2b\) | |
Cisco Unified Communications Manager | =8.0\(2c\) | |
Cisco Unified Communications Manager | =8.0\(2c\)su1 | |
Cisco Unified Communications Manager | =8.0\(3\) | |
Cisco Unified Communications Manager | =8.0\(3a\) | |
Cisco Unified Communications Manager | =8.0\(3a\)su1 | |
Cisco Unified Communications Manager | =8.0\(3a\)su2 | |
Cisco Unified Communications Manager | =8.0\(3a\)su3 | |
Cisco Unified Communications Manager | =8.5 | |
Cisco Unified Communications Manager | =8.5\(1\) | |
Cisco Unified Communications Manager | =8.5\(1\)su1 | |
Cisco Unified Communications Manager | =8.5\(1\)su2 | |
Cisco Unified Communications Manager | =8.5\(1\)su3 | |
Cisco Unified Communications Manager | =8.5\(1\)su4 | |
Cisco Unified Communications Manager | =8.5\(1\)su5 | |
Cisco Unified Communications Manager | =8.6 | |
Cisco Unified Communications Manager | =8.6\(1\) | |
Cisco Unified Communications Manager | =8.6\(1a\) | |
Cisco Unified Communications Manager | =8.6\(2\) | |
Cisco Unified Communications Manager | =8.6\(2a\) | |
Cisco Unified Communications Manager | =8.6\(2a\)su1 | |
Cisco Unified Communications Manager | =8.6\(2a\)su2 | |
Cisco Unified Communications Manager | =8.6\(2a\)su3 | |
Cisco Unified Communications Manager | =8.6\(3\) | |
Cisco Unified Communications Manager | =8.6\(4\) | |
Cisco Unified Communications Manager | =9.0\(1\) | |
Cisco Unified Communications Manager | =9.1\(1\) | |
Cisco Unified Communications Manager | =9.1\(2\) | |
Cisco Unified Communications Manager | =9.1.1\(a\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3412 has been identified as a high severity SQL injection vulnerability that allows remote authenticated users to execute arbitrary SQL commands.
To fix CVE-2013-3412, users should upgrade their Cisco Unified Communications Manager to a version that is not affected by this vulnerability, specifically version 9.1(2) or later.
CVE-2013-3412 affects users of Cisco Unified Communications Manager versions 7.1(x) through 9.1(2).
Yes, CVE-2013-3412 can be exploited by remote authenticated users who can execute SQL commands.
CVE-2013-3412 allows attackers to execute arbitrary SQL commands, potentially leading to unauthorized data access or manipulation.