Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-1579


A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.


Published

2021-08-25T20:15:10.303

Last Modified

2024-11-21T05:44:39.990

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.1 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-250
  • Type: Primary
    CWE-269

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco application_policy_infrastructure_controller < 3.2\(10f\) Yes
Application cisco application_policy_infrastructure_controller < 4.2\(7l\) Yes
Application cisco application_policy_infrastructure_controller < 5.2\(2f\) Yes
Application cisco cloud_application_policy_infrastructure_controller < 3.2\(10f\) Yes
Application cisco cloud_application_policy_infrastructure_controller < 4.2\(7l\) Yes
Application cisco cloud_application_policy_infrastructure_controller < 5.2\(2f\) Yes

References