Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-1582


A vulnerability in the web UI of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow an authenticated, remote attacker to perform a stored cross-site scripting attack on an affected system. This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by sending malicious input to the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based interface or access sensitive, browser-based information.


Published

2021-08-25T20:15:10.697

Last Modified

2024-11-21T05:44:40.390

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.4 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

6.8

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-79
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco application_policy_infrastructure_controller < 3.2\(10f\) Yes
Application cisco application_policy_infrastructure_controller < 4.2\(7i\) Yes
Application cisco application_policy_infrastructure_controller < 5.2\(2f\) Yes
Application cisco cloud_application_policy_infrastructure_controller < 3.2\(10f\) Yes
Application cisco cloud_application_policy_infrastructure_controller < 4.2\(7i\) Yes
Application cisco cloud_application_policy_infrastructure_controller < 5.2\(1h\) Yes

References