Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on April 06, 2022, 06:04:07 AM

Title: Cisco Security Advisory - Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability
Post by: Netwörkheäd on April 06, 2022, 06:04:07 AM
Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability

<p>A vulnerability in an API endpoint of Cisco&nbsp;Application Policy Infrastructure Controller (APIC) and Cisco&nbsp;Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with <em>Administrator</em> read-only credentials to elevate privileges on an affected system.</p>
<p>This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with <em>Administrator</em> read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to <em>Administrator</em> with write privileges on the affected device.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8" target="_blank" rel="noopener">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8</a></p>

     
         
Security Impact Rating:  High
   
   
       
CVE: CVE-2021-1579
Source: Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Application%20Policy%20Infrastructure%20Controller%20App%20Privilege%20Escalation%20Vulnerability&vs_k=1)