First published: Sat Jul 02 2016(Updated: )
The API in Cisco Prime Infrastructure 1.2 through 3.0 and Evolved Programmable Network Manager (EPNM) 1.2 allows remote attackers to execute arbitrary code or obtain sensitive management information via a crafted HTTP request, as demonstrated by discovering managed-device credentials, aka Bug ID CSCuy10231.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Infrastructure | =1.2 | |
Cisco Prime Infrastructure | =1.2.0.103 | |
Cisco Prime Infrastructure | =1.2.1 | |
Cisco Prime Infrastructure | =1.3 | |
Cisco Prime Infrastructure | =1.3.0.20 | |
Cisco Prime Infrastructure | =1.4 | |
Cisco Prime Infrastructure | =1.4.0.45 | |
Cisco Prime Infrastructure | =1.4.1 | |
Cisco Prime Infrastructure | =1.4.2 | |
Cisco Prime Infrastructure | =2.0 | |
Cisco Prime Infrastructure | =2.1.0 | |
Cisco Prime Infrastructure | =2.2 | |
Cisco Prime Infrastructure | =2.2\(2\) | |
Cisco Evolved Programmable Network Manager | =1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1289 is rated as critical due to its potential to allow remote code execution and exposure of sensitive information.
To fix CVE-2016-1289, update your Cisco Prime Infrastructure and Evolved Programmable Network Manager to the latest versions provided by Cisco.
CVE-2016-1289 affects Cisco Prime Infrastructure versions 1.2 through 3.0 and Cisco Evolved Programmable Network Manager version 1.2.
CVE-2016-1289 can be exploited through crafted HTTP requests that lead to arbitrary code execution or exposure of management credentials.
There are no specific mitigations recommended for CVE-2016-1289 other than applying the security updates from Cisco.