Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2015-4235


Cisco Application Policy Infrastructure Controller (APIC) devices with software before 1.0(3o) and 1.1 before 1.1(1j) and Nexus 9000 ACI devices with software before 11.0(4o) and 11.1 before 11.1(1j) do not properly restrict access to the APIC filesystem, which allows remote authenticated users to obtain root privileges via unspecified use of the APIC cluster-management configuration feature, aka Bug IDs CSCuu72094 and CSCuv11991.


Published

2015-07-24T14:59:00.073

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 9.0 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-264

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco application_policy_infrastructure_controller_\(apic\) 1.0\(1e\) Yes
Operating System cisco nx-os 11.0\(1b\) Yes
Operating System cisco nx-os 11.0\(1c\) Yes
Operating System cisco nx-os 11.0\(1d\) Yes
Operating System cisco nx-os 11.0\(1e\) Yes
Operating System cisco nx-os 11.0\(2j\) Yes
Operating System cisco nx-os 11.0\(2m\) Yes
Operating System cisco nx-os 11.0\(3f\) Yes
Operating System cisco nx-os 11.0\(3i\) Yes
Operating System cisco nx-os 11.0\(3k\) Yes
Operating System cisco nx-os 11.0\(3n\) Yes
Operating System cisco nx-os 11.0\(4h\) Yes

References