QID 317019
Date Published: 2021-08-26
QID 317019: Cisco Application Policy Infrastructure Controller (APIC) App Privilege Escalation Vulnerability (cisco-sa-capic-chvul-CKfGYBh8)
A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and
Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an
authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system.
Affected Products
Cisco APIC and Cisco Cloud APIC devices if they have installed and enabled apps with admin write privileges.
Vulnerable Releases:
Earlier than 3.2(10f)
4.0 Prior to 4.2(7l)
5.0 Prior to 5.2(2f)
Note: Potential detection as cannot confirm whether Cisco APIC has apps with admin write privileges. Cloud APIC not supported.
QID Detection Logic (Authenticated):
The check matches Cisco APIC version retrieved via Unix Auth using "show version" command.
A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.
Customers are advised to refer to cisco-sa-capic-chvul-CKfGYBh8 for more information.
- cisco-sa-capic-chvul-CKfGYBh8 -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8
CVEs related to QID 317019
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-capic-chvul-CKfGYBh8 |
|