First published: Wed Apr 20 2022(Updated: )
A vulnerability in the web-based management interface of Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database of the affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-sqlinj-GrpUuQEJ
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified CM IM&P | =14<14SU1<12.5(1)SU6<11.5(1)SU11 | 14SU1 12.5(1)SU6 11.5(1)SU11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is cisco-sa-imp-sqlinj-GrpUuQEJ.
The title of the vulnerability is Cisco Unified Communications Manager IM & Presence Service SQL Injection Vulnerability.
The severity of the vulnerability is medium, with a CVSS score of 5.4.
Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) versions 11.5(1)SU11, 12.5(1)SU6, and 14 are affected by this vulnerability.
An authenticated remote attacker can exploit this vulnerability by conducting SQL injection attacks on an affected system.