First published: Thu Feb 08 2018(Updated: )
A vulnerability in the web framework of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct an SQL injection attack against an affected system. The vulnerability exists because the affected software fails to validate user-supplied input in certain SQL queries that bypass protection filters. An attacker could exploit this vulnerability by submitting crafted HTTP requests that contain malicious SQL statements to an affected system. A successful exploit could allow the attacker to determine the presence of certain values in the database of the affected system. Cisco Bug IDs: CSCvg74810.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager Session Management Edition | =11.5\(1.13900.52\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0120 is classified as a critical vulnerability due to its potential for SQL injection attacks.
To mitigate CVE-2018-0120, apply the relevant security patches released by Cisco for the affected versions of Unified Communications Manager.
CVE-2018-0120 affects users of Cisco Unified Communications Manager version 11.5(1.13900.52).
CVE-2018-0120 can allow an authenticated remote attacker to perform SQL injection attacks.
CVE-2018-0120 is specifically reported for version 11.5(1.13900.52) and does not apply to earlier versions unless specified in official advisories.