Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-1577


A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an unauthenticated, remote attacker to read or write arbitrary files on an affected system. This vulnerability is due to improper access control. An attacker could exploit this vulnerability by using a specific API endpoint to upload a file to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on an affected device.


Published

2021-08-25T20:15:09.883

Last Modified

2024-11-21T05:44:39.720

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.1 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

4.9

Weaknesses
  • Type: Secondary
    CWE-284
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco application_policy_infrastructure_controller < 3.2\(10e\) Yes
Application cisco application_policy_infrastructure_controller < 4.2\(6h\) Yes
Application cisco application_policy_infrastructure_controller < 5.1\(3e\) Yes
Application cisco cloud_application_policy_infrastructure_controller < 3.2\(10e\) Yes
Application cisco cloud_application_policy_infrastructure_controller < 4.2\(6h\) Yes
Application cisco cloud_application_policy_infrastructure_controller < 5.1\(3e\) Yes

References