Lucene search

K
cvelistCiscoCVELIST:CVE-2021-1579
HistoryAug 25, 2021 - 7:10 p.m.

CVE-2021-1579 Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability

2021-08-2519:10:26
CWE-250
cisco
www.cve.org
6
cisco
apic
cloud
privilege escalation
api
vulnerability
remote attacker
administrator
credentials
rbac

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.002

Percentile

53.3%

A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.

CNA Affected

[
  {
    "product": "Cisco Application Policy Infrastructure Controller (APIC)",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.002

Percentile

53.3%

Related for CVELIST:CVE-2021-1579