SQL Injection in Ciser System SL firmware

Posted date 02/03/2026
Identificador
INCIBE-2026-157
Importance
5 - Critical
Affected Resources

CSIP firmware versions from 3.0 to 5.1.

Description

INCIBE has coordinated the publication of a high severity vulnerability in Ciser System SL firmware, a telecommunications company. The vulnerability was discovered by Ciser System SL.

This vulnerability has been assigned the following code, CVSS v4.0 base score, CVSS vector and CWE vulnerability type:

  • CVE-2026-2584: CVSS v4.0: 9.3 | CVSS AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:L/SI:N/SA:N | CWE-89
Solution
1. Immediate Action (Workarounds)
  • If an immediate firmware update is not feasible, network-level controls must be implemented to reduce the attack surface:
    • Access Restriction: Limit access to the management or login panel using an Allowlist. All connection attempts from untrusted networks or the public internet must be strictly blocked.
    • Network Segmentation: Isolate the management interface within a dedicated management VLAN, accessible only through a secure corporate VPN.
2. Permanent Solution (Remediation)
  • The vulnerability has been fixed by the vendor through improved input validation logic and parameterized queries:
  • It is recommended to update to firmware version 5.3 or higher. This version mitigates the risk by ensuring that SQL queries are handled securely, effectively neutralizing the injection vector.
Detail

CVE-2026-2584: a critical SQL Injection (SQLi) vulnerability has been identified in the authentication module of the system. An unauthenticated, remote attacker (AV:N/PR:N) can exploit this flaw by sending specially crafted SQL queries through the login interface. Due to low attack complexity (AC:L) and the absence of specific requirements (AT:N), the vulnerability allows for a total compromise of the system's configuration data (VC:H/VI:H). While the availability of the service remains unaffected (VA:N), the breach may lead to a limited exposure of sensitive information regarding subsequent or interconnected systems (SC:L).

CVE
Identificador CVE Severidad Explotación Fabricante