CVE Vulnerabilities

CVE-2021-1579

Execution with Unnecessary Privileges

Published: Aug 25, 2021 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
9 HIGH
AV:N/AC:L/Au:S/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.

Weakness

The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.

Affected Software

Name Vendor Start Version End Version
Application_policy_infrastructure_controller Cisco * 3.2(10f) (excluding)
Application_policy_infrastructure_controller Cisco 4.0 (including) 4.2(7l) (excluding)
Application_policy_infrastructure_controller Cisco 5.0 (including) 5.2(2f) (excluding)
Cloud_application_policy_infrastructure_controller Cisco * 3.2(10f) (excluding)
Cloud_application_policy_infrastructure_controller Cisco 4.0 (including) 4.2(7l) (excluding)
Cloud_application_policy_infrastructure_controller Cisco 5.0 (including) 5.2(2f) (excluding)

Potential Mitigations

References