Lucene search

K
ciscoCiscoCISCO-SA-CAPIC-CHVUL-CKFGYBH8
HistoryAug 25, 2021 - 4:00 p.m.

Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability

2021-08-2516:00:00
tools.cisco.com
50
cisco
apic
privilege escalation
vulnerability
api
rbac
administrator
credentials
software update

EPSS

0.002

Percentile

53.3%

A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system.

This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8”]

Affected configurations

Vulners
Node
ciscoapplication_policy_infrastructure_controller_\(apic\)Matchany
OR
ciscoapplication_policy_infrastructure_controller_\(apic\)Matchany
VendorProductVersionCPE
ciscoapplication_policy_infrastructure_controller_\(apic\)anycpe:2.3:o:cisco:application_policy_infrastructure_controller_\(apic\):any:*:*:*:*:*:*:*

EPSS

0.002

Percentile

53.3%

Related for CISCO-SA-CAPIC-CHVUL-CKFGYBH8