CVE-2021-1579
25.08.2021, 20:15
A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | application_policy_infrastructure_controller | 𝑥 < 3.2\(10f\) |
cisco | application_policy_infrastructure_controller | 4.0 ≤ 𝑥 < 4.2\(7l\) |
cisco | application_policy_infrastructure_controller | 5.0 ≤ 𝑥 < 5.2\(2f\) |
cisco | cloud_application_policy_infrastructure_controller | 𝑥 < 3.2\(10f\) |
cisco | cloud_application_policy_infrastructure_controller | 4.0 ≤ 𝑥 < 4.2\(7l\) |
cisco | cloud_application_policy_infrastructure_controller | 5.0 ≤ 𝑥 < 5.2\(2f\) |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-250 - Execution with Unnecessary PrivilegesThe software performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
- CWE-269 - Improper Privilege ManagementThe software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.