CVE-2021-1579

A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:application_policy_infrastructure_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:application_policy_infrastructure_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:application_policy_infrastructure_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloud_application_policy_infrastructure_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloud_application_policy_infrastructure_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:cloud_application_policy_infrastructure_controller:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:44

Type Values Removed Values Added
CVSS v2 : 9.0
v3 : 8.8
v2 : 9.0
v3 : 8.1
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8 - Patch, Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8 - Patch, Vendor Advisory

Information

Published : 2021-08-25 20:15

Updated : 2024-11-21 05:44


NVD link : CVE-2021-1579

Mitre link : CVE-2021-1579

CVE.ORG link : CVE-2021-1579


JSON object : View

Products Affected

cisco

  • cloud_application_policy_infrastructure_controller
  • application_policy_infrastructure_controller
CWE
CWE-250

Execution with Unnecessary Privileges

CWE-269

Improper Privilege Management