The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Cisco Prime Infrastructure

vulnerability note CVE-2019-1906

Cisco Prime Infrastructure: privilege escalation via EPN Manager Virtual Domain Configuration

Synthesis of the vulnerability

An attacker can bypass restrictions via EPN Manager Virtual Domain Configuration of Cisco Prime Infrastructure, in order to escalate his privileges.
Impacted products: Prime Infrastructure.
Severity: 2/4.
Consequences: privileged access/rights, data creation/edition.
Provenance: user account.
Creation date: 04/07/2019.
Identifiers: CERTFR-2019-AVI-304, cisco-sa-20190619-prime-privescal, CSCvo46881, CSCvq37787, CVE-2019-1906, VIGILANCE-VUL-29684.

Description of the vulnerability

An attacker can bypass restrictions via EPN Manager Virtual Domain Configuration of Cisco Prime Infrastructure, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2019-1906

Cisco Prime Infrastructure: privilege escalation via Virtual Domain Configuration

Synthesis of the vulnerability

An attacker can bypass restrictions via Virtual Domain Configuration of Cisco Prime Infrastructure, in order to escalate his privileges.
Impacted products: Prime Infrastructure.
Severity: 2/4.
Consequences: privileged access/rights.
Provenance: user account.
Creation date: 20/06/2019.
Identifiers: CERTFR-2019-AVI-284, cisco-sa-20190619-prime-privescal, CSCvo46881, CVE-2019-1906, VIGILANCE-VUL-29571.

Description of the vulnerability

An attacker can bypass restrictions via Virtual Domain Configuration of Cisco Prime Infrastructure, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2019-1824 CVE-2019-1825

Cisco Prime Infrastructure: SQL injection via Web UI

Synthesis of the vulnerability

An attacker can use a SQL injection via the Web UI of Cisco Prime Infrastructure, in order to read or alter data.
Impacted products: Prime Infrastructure.
Severity: 2/4.
Consequences: data reading, data creation/edition, data deletion.
Provenance: internet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 16/05/2019.
Identifiers: CERTFR-2019-AVI-228, cisco-sa-20190515-pi-sqlinject, CVE-2019-1824, CVE-2019-1825, VIGILANCE-VUL-29318.

Description of the vulnerability

An attacker can use a SQL injection via the Web UI of Cisco Prime Infrastructure, in order to read or alter data.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2019-1659

Cisco Prime Infrastructure: Man-in-the-Middle via SSL Certificate Not Validated

Synthesis of the vulnerability

An attacker can act as a Man-in-the-Middle via SSL Certificate Not Validated on Cisco Prime Infrastructure, in order to read or write data in the session.
Impacted products: Prime Infrastructure.
Severity: 2/4.
Consequences: data reading, data creation/edition.
Provenance: internet server.
Creation date: 21/02/2019.
Identifiers: CERTFR-2019-AVI-073, cisco-sa-20190220-prime-validation, CSCvj87015, CVE-2019-1659, VIGILANCE-VUL-28576.

Description of the vulnerability

An attacker can act as a Man-in-the-Middle via SSL Certificate Not Validated on Cisco Prime Infrastructure, in order to read or write data in the session.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2019-1643

Cisco Prime Infrastructure: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to run JavaScript code in the context of the web site.
Impacted products: Prime Infrastructure.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 24/01/2019.
Identifiers: CERTFR-2019-AVI-034, cisco-sa-20190123-cpi-xss, CSCvm81867, CVE-2019-1643, VIGILANCE-VUL-28343.

Description of the vulnerability

The Cisco Prime Infrastructure product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2018-15457

Cisco Prime Infrastructure: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to run JavaScript code in the context of the web site.
Impacted products: Prime Infrastructure.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 10/01/2019.
Identifiers: cisco-sa-20190109-cpi-xss, CSCvm74707, CVE-2018-15457, VIGILANCE-VUL-28201.

Description of the vulnerability

The Cisco Prime Infrastructure product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2018-15433

Cisco Prime Infrastructure: information disclosure via GET Request

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via GET Request of Cisco Prime Infrastructure, in order to obtain sensitive information.
Impacted products: Prime Infrastructure.
Severity: 2/4.
Consequences: data reading.
Provenance: user account.
Creation date: 04/10/2018.
Identifiers: CERTFR-2018-AVI-468, cisco-sa-20181003-prime-id, CSCvg93152, CVE-2018-15433, VIGILANCE-VUL-27407.

Description of the vulnerability

An attacker can bypass access restrictions to data via GET Request of Cisco Prime Infrastructure, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-15379

Cisco Prime Infrastructure: file upload via Unrestricted Directory Permissions

Synthesis of the vulnerability

An attacker can upload a malicious file via Unrestricted Directory Permissions on Cisco Prime Infrastructure, in order for example to upload a Trojan.
Impacted products: Prime Infrastructure.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights.
Provenance: internet client.
Creation date: 04/10/2018.
Identifiers: CERTFR-2018-AVI-468, cisco-sa-20181003-pi-tftp, CSCvk24890, CVE-2018-15379, VIGILANCE-VUL-27406.

Description of the vulnerability

An attacker can upload a malicious file via Unrestricted Directory Permissions on Cisco Prime Infrastructure, in order for example to upload a Trojan.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2018-15432

Cisco Prime Infrastructure: information disclosure via Server Backup

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Server Backup of Cisco Prime Infrastructure, in order to obtain sensitive information.
Impacted products: Prime Infrastructure.
Severity: 2/4.
Consequences: data reading.
Provenance: user account.
Creation date: 04/10/2018.
Identifiers: CERTFR-2018-AVI-468, cisco-sa-20181003-pi-id, CSCvg93148, CVE-2018-15432, VIGILANCE-VUL-27405.

Description of the vulnerability

An attacker can bypass access restrictions to data via Server Backup of Cisco Prime Infrastructure, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2018-5391

Linux kernel: denial of service via FragmentSmack

Synthesis of the vulnerability

An attacker can generate a fatal error via FragmentSmack of the Linux kernel, in order to trigger a denial of service.
Impacted products: GAiA, SecurePlatform, CheckPoint Security Gateway, Cisco Aironet, IOS XE Cisco, Nexus by Cisco, Prime Collaboration Assurance, Prime Infrastructure, Cisco Router, Secure ACS, Cisco CUCM, Cisco UCS, Cisco Unified CCX, Cisco IP Phone, Cisco Wireless Controller, Debian, BIG-IP Hardware, TMOS, Junos Space, Linux, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, openSUSE Leap, Palo Alto Firewall PA***, PAN-OS, RHEL, RSA Authentication Manager, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, ProxySG by Symantec, Synology DSM, Ubuntu.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: internet client.
Creation date: 16/08/2018.
Identifiers: ADV180022, CERTFR-2018-AVI-390, CERTFR-2018-AVI-392, CERTFR-2018-AVI-419, CERTFR-2018-AVI-457, CERTFR-2018-AVI-478, CERTFR-2018-AVI-533, CERTFR-2019-AVI-233, CERTFR-2019-AVI-242, cisco-sa-20180824-linux-ip-fragment, CVE-2018-5391, DLA-1466-1, DLA-1529-1, DSA-2019-062, DSA-4272-1, FragmentSmack, JSA10917, K74374841, openSUSE-SU-2018:2404-1, openSUSE-SU-2018:2407-1, openSUSE-SU-2019:0274-1, PAN-SA-2018-0012, RHSA-2018:2785-01, RHSA-2018:2791-01, RHSA-2018:2846-01, RHSA-2018:2924-01, RHSA-2018:2925-01, RHSA-2018:2933-01, RHSA-2018:2948-01, RHSA-2018:3083-01, RHSA-2018:3096-01, RHSA-2018:3459-01, RHSA-2018:3540-01, RHSA-2018:3586-01, RHSA-2018:3590-01, sk134253, SUSE-SU-2018:2344-1, SUSE-SU-2018:2374-1, SUSE-SU-2018:2380-1, SUSE-SU-2018:2381-1, SUSE-SU-2018:2596-1, SUSE-SU-2019:0541-1, SUSE-SU-2019:1289-1, SYMSA1467, Synology-SA-18:44, USN-3740-1, USN-3740-2, USN-3741-1, USN-3741-2, USN-3741-3, USN-3742-1, USN-3742-2, USN-3742-3, VIGILANCE-VUL-27009, VU#641765.

Description of the vulnerability

An attacker can generate a fatal error via FragmentSmack of the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Cisco Prime Infrastructure: