First published: Wed Jan 17 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain and modify sensitive information that is stored in the underlying database.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Evolved Programmable Network Manager | <7.1.1 | |
Cisco Prime Infrastructure | <3.10.4 | |
Cisco Prime Infrastructure | =3.10.4 | |
Cisco Prime Infrastructure | =3.10.4-update_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20271 is rated as critical due to the potential for SQL injection attacks.
To fix CVE-2023-20271, update Cisco Prime Infrastructure to version 3.10.4 or 3.10.4-update_1 and Cisco EPNM to versions prior to 7.1.1.
CVE-2023-20271 affects users of Cisco Prime Infrastructure versions up to 3.10.4 and Cisco EPNM versions up to but not including 7.1.1.
CVE-2023-20271 allows authenticated remote attackers to conduct SQL injection attacks.
Yes, CVE-2023-20271 can be exploited remotely by authenticated attackers.