Metrics
Affected Vendors & Products
No advisories yet.
Solution
The vulnerability has been fixed by the vendor through improved input validation logic and parameterized queries: It is recommended to update to firmware version 5.3 or higher. This version mitigates the risk by ensuring that SQL queries are handled securely, effectively neutralizing the injection vector.
Workaround
If an immediate firmware update is not feasible, network-level controls must be implemented to reduce the attack surface: * Access Restriction: Limit access to the management or login panel using an Allowlist. All connection attempts from untrusted networks or the public internet must be strictly blocked. * Network Segmentation: Isolate the management interface within a dedicated management VLAN, accessible only through a secure corporate VPN.
Mon, 02 Mar 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A critical SQL Injection (SQLi) vulnerability has been identified in the authentication module of the system. An unauthenticated, remote attacker (AV:N/PR:N) can exploit this flaw by sending specially crafted SQL queries through the login interface. Due to low attack complexity (AC:L) and the absence of specific requirements (AT:N), the vulnerability allows for a total compromise of the system's configuration data (VC:H/VI:H). While the availability of the service remains unaffected (VA:N), the breach may lead to a limited exposure of sensitive information regarding subsequent or interconnected systems (SC:L). | |
| Title | SQL Injection in Ciser System SL firmware | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-03-02T09:01:12.291Z
Reserved: 2026-02-16T13:17:13.207Z
Link: CVE-2026-2584
No data.
Status : Received
Published: 2026-03-02T09:16:18.150
Modified: 2026-03-02T09:16:18.150
Link: CVE-2026-2584
No data.
OpenCVE Enrichment
No data.