Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-1578


A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker to elevate privileges to Administrator on an affected device. This vulnerability is due to an improper policy default setting. An attacker could exploit this vulnerability by using a non-privileged credential for Cisco ACI Multi-Site Orchestrator (MSO) to send a specific API request to a managed Cisco APIC or Cloud APIC device. A successful exploit could allow the attacker to obtain Administrator credentials on the affected device.


Published

2021-08-25T20:15:10.080

Last Modified

2024-11-21T05:44:39.860

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-636
  • Type: Primary
    CWE-755

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco application_policy_infrastructure_controller ≤ 5.1\(3e\) Yes
Application cisco application_policy_infrastructure_controller 5.0\(2h\) Yes
Application cisco cloud_application_policy_infrastructure_controller ≤ 5.1\(3e\) Yes
Application cisco cloud_application_policy_infrastructure_controller 5.0\(2h\) Yes

References