Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability
<p>A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with <em>Administrator</em> read-only credentials to elevate privileges on an affected system.</p>
<p>This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with <em>Administrator</em> read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to <em>Administrator</em> with write privileges on the affected device.</p>
<p>Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8" target="_blank" rel="noopener">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8</a></p>
Security Impact Rating: High
CVE: CVE-2021-1579
Source: Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Application%20Policy%20Infrastructure%20Controller%20App%20Privilege%20Escalation%20Vulnerability&vs_k=1)