QID 317030

Date Published: 2021-09-09

QID 317030: Cisco Application Policy Infrastructure Controller (APIC) Command Injection Vulnerability (cisco-sa-capic-mdvul-HBsJBuvW)

Multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or
Cisco Cloud APIC could allow a remote attacker to perform a command injection.

Affected Products
Cisco APIC and Cisco Cloud APIC.
Earlier than 3.2 Prior to 3.2(10e)
From 4.0 Prior to 4.2(6h)
From 5.0 Prior to 5.1(3e)
From 5.2 Prior to 5.2(1g)
Note: No Support for Cloud APIC

QID Detection Logic (Authenticated):
The check matches Cisco APIC version retrieved via Unix Auth using "show version" command.

A successful exploit could allow the attacker to execute arbitrary commands with root-level privileges on an affected device or to fill the upload partition of the affected device.

  • CVSS V3 rated as High - 7.2 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution

    Customers are advised to refer to cisco-sa-capic-mdvul-HBsJBuvW for more information.

    CVEs related to QID 317030

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-capic-mdvul-HBsJBuvW URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW