Cisco Prime License Manager SQL Injection Vulnerability

cisco-sa-20181128-plm-sql-inject · Critical · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

Update (2018-December-20): The updated patch ciscocm.CSCvk30822_v2.0.k3.cop.sgn that avoids the functional issues identified with the v1.0 patch has been posted to Cisco.com. See the Fixed Releases section for details. Update (2018-December-10): Installing the ciscocm.CSCvk30822_v1.0.k3.cop.sgn patch may cause functional issues. Workarounds are available for some of these issues. Rolling back this patch as described in the Fixed Releases section will correct these functional issues, but the device will be affected by this vulnerability again when the patch is not in place. See the Fixed Releases section for details. A vulnerability in the web framework code of Cisco Prime License Manager (PLM) could allow an unauthenticated, remote attacker to execute arbitrary SQL queries. The vulnerability is due to a lack of proper validation of user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted HTTP POST requests that contain malicious SQL statements to an affected application. A successful exploit could allow the attacker to modify and delete arbitrary data in the PLM database or gain shell access with the privileges of the postgres user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-inject

Workarounds

There are no workarounds that address this vulnerability.

Customers with coresident deployments of Cisco Prime License Manager as part of Cisco Unified Communications Manager or Cisco Unity Connection who do not use PLM can disable the feature to close the attack vector as follows:

Log in to the Cisco Unified Communications Manager or Cisco Unity Connection CLI as admin user.
Run the command license management system remove.
Confirm with y.
Wait for the operation to complete; afterwards, the system will reboot automatically.

Note: This procedure needs to be executed on all nodes in a cluster. It will persist across upgrades.

CVEsCVE-2018-15441
Cisco Bug IDsCSCvk30822
CVSS ScoreBase 9.4
Base 9.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H/E:X/RL:X/RC:X

Products with public affected evidence