Vulnerability Description
The web-based management interface on Cisco SA 500 series security appliances with software before 2.1.19 allows remote authenticated users to execute arbitrary commands via crafted parameters to web forms, aka Bug ID CSCtq65681.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Sa500 Software | <= 2.1.18 |
| Cisco | Sa520 | All versions |
| Cisco | Sa520W | All versions |
| Cisco | Sa540 | All versions |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/45355Vendor Advisory
- http://securitytracker.com/id?1025810
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8915e.sVendor Advisory
- http://www.securityfocus.com/bid/48810
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68738
- http://secunia.com/advisories/45355Vendor Advisory
- http://securitytracker.com/id?1025810
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b8915e.sVendor Advisory
- http://www.securityfocus.com/bid/48810
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68738
FAQ
What is CVE-2011-2547?
CVE-2011-2547 is a vulnerability with a CVSS score of 9.0 (HIGH). The web-based management interface on Cisco SA 500 series security appliances with software before 2.1.19 allows remote authenticated users to execute arbitrary commands via crafted parameters to web ...
How severe is CVE-2011-2547?
CVE-2011-2547 has been rated HIGH with a CVSS base score of 9.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-2547?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Sa500 Software, Cisco Sa520, Cisco Sa520W, Cisco Sa540.