A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.
2021-08-25T20:15:10.303
2024-11-21T05:44:39.990
Modified
CVSSv3.1: 8.1 (HIGH)
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | application_policy_infrastructure_controller | < 3.2\(10f\) | Yes |
Application | cisco | application_policy_infrastructure_controller | < 4.2\(7l\) | Yes |
Application | cisco | application_policy_infrastructure_controller | < 5.2\(2f\) | Yes |
Application | cisco | cloud_application_policy_infrastructure_controller | < 3.2\(10f\) | Yes |
Application | cisco | cloud_application_policy_infrastructure_controller | < 4.2\(7l\) | Yes |
Application | cisco | cloud_application_policy_infrastructure_controller | < 5.2\(2f\) | Yes |