6.5
CVSSv2

CVE-2016-1359

Published: 03/03/2016 Updated: 29/07/2019
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

A vulnerability in the log file handling for Cisco Prime Infrastructure could allow an authenticated, remote malicious user to change and modify the system log file. The log file could have executable code added to it that could be executed when the log file is viewed. The vulnerability is due to lack of proper input validation when the system log file is referenced. An attacker could exploit this vulnerability by crafting an HTTP request with specially formatted HTTP payload. An exploit could allow the malicious user to execute remote code on the affected system. Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-cpi1

Vulnerable Product Search on Vulmon Subscribe to Product

cisco prime infrastructure 3.0

Vendor Advisories

A vulnerability in the log file handling for Cisco Prime Infrastructure could allow an authenticated, remote attacker to change and modify the system log file The log file could have executable code added to it that could be executed when the log file is viewed The vulnerability is due to lack of proper input validation when the system log file ...