First published: Wed Jun 03 2020(Updated: )
A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain and modify sensitive information that is stored in the underlying database.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Infrastructure | <=3.7.1 | |
Cisco Prime Infrastructure | =3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3339 is a vulnerability in the web-based management interface of Cisco Prime Infrastructure that could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
CVE-2020-3339 has a severity rating of medium with a CVSS score of 5.4.
Cisco Prime Infrastructure versions up to 3.7.1 and version 3.8 are affected by CVE-2020-3339.
The Common Weakness Enumeration (CWE) for CVE-2020-3339 is CWE-89, which refers to improper neutralization of special elements used in an SQL command ('SQL Injection').
To fix CVE-2020-3339, Cisco recommends upgrading to a fixed software release.