First published: Tue Nov 26 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability exists because the web-based management interface improperly validates SQL values. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager | =10.5\(2.10000.5\) | |
Cisco Unified Communications Manager | =11.5\(1.10000.6\) | |
Cisco Unified Communications Manager | =12.0\(1.10000.10\) | |
Cisco Unified Communications Manager | =12.5\(1.10000.22\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15972 is a vulnerability in the web-based management interface of Cisco Unified Communications Manager that allows an authenticated, remote attacker to conduct SQL injection attacks.
The severity of CVE-2019-15972 is high, with a CVSS score of 8.8.
CVE-2019-15972 affects Cisco Unified Communications Manager versions 10.5(2.10000.5), 11.5(1.10000.6), 12.0(1.10000.10), and 12.5(1.10000.22).
An attacker can exploit CVE-2019-15972 by sending malicious SQL values through the web-based management interface of Cisco Unified Communications Manager.
Yes, Cisco has released a security advisory with mitigation details for CVE-2019-15972. Please refer to the Cisco website for more information.