Cisco Unified Operations Manager SQL Injection Vulnerability

Cisco-SA-20130719-CVE-2013-3437 · Medium · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

A vulnerability in the management application of the Cisco Unified Operations Manager could allow an authenticated, remote attacker to execute arbitrary Structured Query Language (SQL) queries. The vulnerability is due to a failure to validate user-supplied input used in SQL queries. An attacker could exploit this vulnerability by including SQL statements in an entry field. Cisco has confirmed this vulnerability in a security notice; however, software updates are not available. To exploit the vulnerability, the attacker must be able to authenticate to a targeted device to submit malicious SQL statements. In addition, the attacker may need access to trusted, internal networks in which the targeted device may reside. These access requirements could reduce the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to contact the vendor regarding future updates and releases.

Administrators are advised to allow only trusted users to have network access.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

For additional information about SQL injection attacks and defenses, see Understanding SQL Injectionhttp://www.cisco.com/web/about/security/intelligence/sql_injection.html .

Administrators are advised to monitor affected systems.

CVEsCVE-2013-3437
Cisco Bug IDsCSCud80179
CVSS ScoreBase 5.5
Base 5.5 AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:U/RC:C

Products with public affected evidence