First published: Wed Apr 06 2016(Updated: )
Cisco Prime Infrastructure 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager (EPNM) 1.2 allow remote attackers to execute arbitrary code via crafted deserialized data in an HTTP POST request, aka Bug ID CSCuw03192.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Evolved Programmable Network Manager | =1.2.0 | |
Cisco Prime Infrastructure | =1.2 | |
Cisco Prime Infrastructure | =1.2.0.103 | |
Cisco Prime Infrastructure | =1.2.1 | |
Cisco Prime Infrastructure | =1.3 | |
Cisco Prime Infrastructure | =1.3.0.20 | |
Cisco Prime Infrastructure | =1.4 | |
Cisco Prime Infrastructure | =1.4.0.45 | |
Cisco Prime Infrastructure | =1.4.1 | |
Cisco Prime Infrastructure | =1.4.2 | |
Cisco Prime Infrastructure | =2.0 | |
Cisco Prime Infrastructure | =2.1.0 | |
Cisco Prime Infrastructure | =2.2 | |
Solaris | =snv_124 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1291 has a critical severity rating due to the potential for remote code execution.
To fix CVE-2016-1291, it is recommended to upgrade to a patched version of Cisco Prime Infrastructure or Cisco Evolved Programmable Network Manager.
CVE-2016-1291 affects Cisco Prime Infrastructure version 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager version 1.2.
Yes, CVE-2016-1291 can be exploited remotely by attackers through crafted HTTP POST requests.
CVE-2016-1291 allows attackers to execute arbitrary code on the vulnerable systems.