4
CVSSv2

CVE-2017-6754

Published: 07/08/2017 Updated: 09/10/2019
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

A vulnerability in the web-based management interface of the Cisco Smart Net Total Care (SNTC) Software Collector Appliance 3.11 could allow an authenticated, remote malicious user to perform a read-only, blind SQL injection attack, which could allow the malicious user to compromise the confidentiality of the system through SQL timing attacks. The vulnerability is due to insufficient input validation of certain user-supplied fields that are subsequently used by the affected software to build SQL queries. An attacker could exploit this vulnerability by submitting crafted URLs, which are designed to exploit the vulnerability, to the affected software. To execute an attack successfully, the attacker would need to submit a number of requests to the affected software. A successful exploit could allow the malicious user to determine the presence of values in the SQL database of the affected software. Cisco Bug IDs: CSCvf07617.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco smart net total care collector appliance 3.11

Vendor Advisories

A vulnerability in the web-based management interface of the Cisco Smart Net Total Care (SNTC) Contracts Details Page could allow an authenticated, remote attacker to perform a read-only, blind SQL injection attack, which could allow the attacker to compromise the confidentiality of the system through SQL timing attacks The vulnerability is due t ...