A vulnerability in the log file handling for Cisco Prime Infrastructure could allow an authenticated, remote malicious user to change and modify the system log file. The log file could have executable code added to it that could be executed when the log file is viewed. The vulnerability is due to lack of proper input validation when the system log file is referenced. An attacker could exploit this vulnerability by crafting an HTTP request with specially formatted HTTP payload. An exploit could allow the malicious user to execute remote code on the affected system. Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-cpi1
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco prime infrastructure 3.0 |