QID 317019

Date Published: 2021-08-26

QID 317019: Cisco Application Policy Infrastructure Controller (APIC) App Privilege Escalation Vulnerability (cisco-sa-capic-chvul-CKfGYBh8)

A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and
Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an
authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system.

Affected Products
Cisco APIC and Cisco Cloud APIC devices if they have installed and enabled apps with admin write privileges.
Vulnerable Releases:
Earlier than 3.2(10f)
4.0 Prior to 4.2(7l)
5.0 Prior to 5.2(2f)
Note: Potential detection as cannot confirm whether Cisco APIC has apps with admin write privileges. Cloud APIC not supported.

QID Detection Logic (Authenticated):
The check matches Cisco APIC version retrieved via Unix Auth using "show version" command.

A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution

    Customers are advised to refer to cisco-sa-capic-chvul-CKfGYBh8 for more information.

    CVEs related to QID 317019

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-capic-chvul-CKfGYBh8 URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8