CVE Vulnerabilities

CVE-2021-1579

Improper Privilege Management

Published: Aug 25, 2021 | Modified: Nov 07, 2023
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
9 HIGH
AV:N/AC:L/Au:S/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

Name Vendor Start Version End Version
Application_policy_infrastructure_controller Cisco * 3.2(10f) (excluding)
Application_policy_infrastructure_controller Cisco 4.0 (including) 4.2(7l) (excluding)
Application_policy_infrastructure_controller Cisco 5.0 (including) 5.2(2f) (excluding)
Cloud_application_policy_infrastructure_controller Cisco * 3.2(10f) (excluding)
Cloud_application_policy_infrastructure_controller Cisco 4.0 (including) 4.2(7l) (excluding)
Cloud_application_policy_infrastructure_controller Cisco 5.0 (including) 5.2(2f) (excluding)

Potential Mitigations

References