First published: Sun Jan 26 2020(Updated: )
A vulnerability in the web interface for Cisco SD-WAN Solution vManage could allow an authenticated, remote attacker to impact the integrity of an affected system by executing arbitrary SQL queries. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input that includes SQL statements to an affected system. A successful exploit could allow the attacker to modify entries in some database tables, affecting the integrity of the data.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Sd-wan Firmware | <=17.2.0 | |
Cisco Vedge-100 | ||
Cisco Vedge-1000 | ||
Cisco Vedge-100b | ||
Cisco Vedge-2000 | ||
Cisco Vedge-5000 | ||
Cisco Vedge 100m | ||
Cisco Vedge 100wm |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12619 is a vulnerability in the web interface for Cisco SD-WAN Solution vManage that could allow an authenticated remote attacker to execute arbitrary SQL queries and impact the integrity of the affected system.
The severity of CVE-2019-12619 is rated as medium with a CVSS score of 6.5.
CVE-2019-12619 allows an authenticated remote attacker to execute arbitrary SQL queries, which can impact the integrity of the affected system.
Cisco SD-WAN Solution vManage versions up to and including 17.2.0 are affected by CVE-2019-12619.
Update Cisco SD-WAN Solution vManage to a version beyond 17.2.0 to mitigate the vulnerability.