CVE-2019-1692

A vulnerability in the web-based management interface of Cisco Application Policy Infrastructure Controller (APIC) Software could allow an unauthenticated, remote attacker to access sensitive system usage information. The vulnerability is due to a lack of proper data protection mechanisms for certain components in the underlying Application Centric Infrastructure (ACI). An attacker could exploit this vulnerability by attempting to observe certain network traffic when accessing the APIC. A successful exploit could allow the attacker to access and collect certain tracking data and usage statistics on an affected device.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:application_policy_infrastructure_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:application_policy_infrastructure_controller:8.3\(1\)s6:*:*:*:*:*:*:*

History

21 Nov 2024, 04:37

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/108155 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/108155 - Third Party Advisory, VDB Entry
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-info-disc - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-info-disc - Vendor Advisory

Information

Published : 2019-05-03 15:29

Updated : 2024-11-21 04:37


NVD link : CVE-2019-1692

Mitre link : CVE-2019-1692

CVE.ORG link : CVE-2019-1692


JSON object : View

Products Affected

cisco

  • application_policy_infrastructure_controller
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-311

Missing Encryption of Sensitive Data