QID 317285

Date Published: 2023-01-24

QID 317285: Cisco Unified Communications Manager SQL Injection Vulnerability (cisco-sa-cucm-sql-rpPczR8n)

A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.

Affected Products:
Cisco Unified Communications Manager releases: from 11.5(1) prior to 12.5(1)SU7 14.x affected hence took 12SU2 and prior. SU3 will be released in march 2023

QID Detection Logic (Authenticated):
The check matches the Cisco Unified Communications Product version retrieved via Unix Auth using " Active Master Version:" command.

A successful exploit could allow the attacker to read or modify any data on the underlying database or elevate their privileges.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.5 severity.
  • Solution

    Customers are advised to refer to cisco-sa-cucm-sql-rpPczR8n for more information.

    CVEs related to QID 317285

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-cucm-sql-rpPczR8n URL Logo sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-sql-rpPczR8n