First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to conduct SQL injection attacks on an affected system. These vulnerabilities exist because the web-based management interface improperly validates values in SQL queries. An attacker could exploit these vulnerabilities by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database or the operating system. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-sqlinjm-xV8dsjq5
Credit: These vulnerabilities were found during internal security testing.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN Solution Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-vman-sqlinjm-xV8dsjq5 is classified as high due to the potential for unauthorized SQL injection attacks.
To fix cisco-sa-vman-sqlinjm-xV8dsjq5, update the Cisco SD-WAN vManage Software to the latest version that addresses these vulnerabilities.
The affected product for cisco-sa-vman-sqlinjm-xV8dsjq5 is Cisco SD-WAN vManage Software.
Yes, cisco-sa-vman-sqlinjm-xV8dsjq5 can be exploited by an unauthenticated, remote attacker.
The potential impacts of cisco-sa-vman-sqlinjm-xV8dsjq5 include unauthorized access to database information and manipulation of data.