All the vulnerabilites related to Cisco - Cisco Application Policy Infrastructure Controller (APIC)
cve-2024-20279
Vulnerability from cvelistv5
Published
2024-08-28 16:19
Modified
2024-08-28 17:54
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller Unauthorized Policy Actions Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20279", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-28T17:54:46.155615Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T17:54:51.419Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.2(8d)" }, { "status": "affected", "version": "2.2(1o)" }, { "status": "affected", "version": "1.2(2h)" }, { "status": "affected", "version": "2.2(2i)" }, { "status": "affected", "version": "1.2(1k)" }, { "status": "affected", "version": "2.2(1k)" }, { "status": "affected", "version": "3.1(2m)" }, { "status": "affected", "version": "3.2(1m)" }, { "status": "affected", "version": "3.2(5e)" }, { "status": "affected", "version": "4.1(2m)" }, { "status": "affected", "version": "3.2(41d)" }, { "status": "affected", "version": "1.1(1o)" }, { "status": "affected", "version": "1.2(1m)" }, { "status": "affected", "version": "1.2(2j)" }, { "status": "affected", "version": "2.2(4r)" }, { "status": "affected", "version": "2.2(3j)" }, { "status": "affected", "version": "1.1(3f)" }, { "status": "affected", "version": "2.2(2f)" }, { "status": "affected", "version": "1.1(4m)" }, { "status": "affected", "version": "2.2(2k)" }, { "status": "affected", "version": "2.1(1i)" }, { "status": "affected", "version": "2.0(1p)" }, { "status": "affected", "version": "3.1(2p)" }, { "status": "affected", "version": "3.2(3s)" }, { "status": "affected", "version": "4.0(3c)" }, { "status": "affected", "version": "1.1(4e)" }, { "status": "affected", "version": "4.1(1k)" }, { "status": "affected", "version": "2.2(4f)" }, { "status": "affected", "version": "2.1(3h)" }, { "status": "affected", "version": "3.2(4d)" }, { "status": "affected", "version": "2.0(1n)" }, { "status": "affected", "version": "2.0(1m)" }, { "status": "affected", "version": "2.0(1r)" }, { "status": "affected", "version": "2.1(2e)" }, { "status": "affected", "version": "4.2(2e)" }, { "status": "affected", "version": "4.2(3j)" }, { "status": "affected", "version": "4.2(3n)" }, { "status": "affected", "version": "2.0(1l)" }, { "status": "affected", "version": "2.2(2e)" }, { "status": "affected", "version": "2.2(3r)" }, { "status": "affected", "version": "3.0(2k)" }, { "status": "affected", "version": "2.1(3g)" }, { "status": "affected", "version": "4.0(1h)" }, { "status": "affected", "version": "2.0(1o)" }, { "status": "affected", "version": "2.2(3p)" }, { "status": "affected", "version": "1.2(3e)" }, { "status": "affected", "version": "2.2(3s)" }, { "status": "affected", "version": "2.0(2g)" }, { "status": "affected", "version": "4.1(1l)" }, { "status": "affected", "version": "3.2(9f)" }, { "status": "affected", "version": "4.2(3l)" }, { "status": "affected", "version": "4.2(2g)" }, { "status": "affected", "version": "1.2(3c)" }, { "status": "affected", "version": "3.2(7k)" }, { "status": "affected", "version": "1.3(2h)" }, { "status": "affected", "version": "3.2(9b)" }, { "status": "affected", "version": "1.3(2k)" }, { "status": "affected", "version": "3.1(2t)" }, { "status": "affected", "version": "1.1(2h)" }, { "status": "affected", "version": "3.2(3j)" }, { "status": "affected", "version": "2.1(2k)" }, { "status": "affected", "version": "2.3(1f)" }, { "status": "affected", "version": "1.2(3h)" }, { "status": "affected", "version": "3.0(1i)" }, { "status": "affected", "version": "4.1(2u)" }, { "status": "affected", "version": "4.2(1l)" }, { "status": "affected", "version": "4.1(1a)" }, { "status": "affected", "version": "4.0(3d)" }, { "status": "affected", "version": "1.1(4l)" }, { "status": "affected", "version": "2.3(1i)" }, { "status": "affected", "version": "3.1(2q)" }, { "status": "affected", "version": "3.2(4e)" }, { "status": "affected", "version": "4.1(1i)" }, { "status": "affected", "version": "3.1(1i)" }, { "status": "affected", "version": "2.0(2m)" }, { "status": "affected", "version": "3.0(2h)" }, { "status": "affected", "version": "2.2(2q)" }, { "status": "affected", "version": "2.3(1l)" }, { "status": "affected", "version": "1.3(1h)" }, { "status": "affected", "version": "3.0(2n)" }, { "status": "affected", "version": "3.2(5f)" }, { "status": "affected", "version": "1.2(1h)" }, { "status": "affected", "version": "3.2(1l)" }, { "status": "affected", "version": "4.2(1i)" }, { "status": "affected", "version": "4.1(2o)" }, { "status": "affected", "version": "1.2(1i)" }, { "status": "affected", "version": "1.3(1j)" }, { "status": "affected", "version": "2.1(1h)" }, { "status": "affected", "version": "2.0(2l)" }, { "status": "affected", "version": "2.0(2h)" }, { "status": "affected", "version": "1.2(2g)" }, { "status": "affected", "version": "3.0(1k)" }, { "status": "affected", "version": "4.2(1g)" }, { "status": "affected", "version": "2.1(2g)" }, { "status": "affected", "version": "2.0(1q)" }, { "status": "affected", "version": "1.1(1j)" }, { "status": "affected", "version": "4.1(2g)" }, { "status": "affected", "version": "1.1(1r)" }, { "status": "affected", "version": "4.2(2f)" }, { "status": "affected", "version": "3.2(6i)" }, { "status": "affected", "version": "1.3(1g)" }, { "status": "affected", "version": "1.3(2j)" }, { "status": "affected", "version": "1.3(2i)" }, { "status": "affected", "version": "2.0(2o)" }, { "status": "affected", "version": "2.2(4q)" }, { "status": "affected", "version": "2.3(1o)" }, { "status": "affected", "version": "3.2(3i)" }, { "status": "affected", "version": "2.2(2j)" }, { "status": "affected", "version": "1.1(1d)" }, { "status": "affected", "version": "2.0(2n)" }, { "status": "affected", "version": "2.2(3t)" }, { "status": "affected", "version": "3.2(3n)" }, { "status": "affected", "version": "1.1(4g)" }, { "status": "affected", "version": "4.1(2x)" }, { "status": "affected", "version": "3.2(5d)" }, { "status": "affected", "version": "3.1(2o)" }, { "status": "affected", "version": "1.2(2i)" }, { "status": "affected", "version": "2.1(2f)" }, { "status": "affected", "version": "1.3(2f)" }, { "status": "affected", "version": "4.2(3q)" }, { "status": "affected", "version": "4.1(1j)" }, { "status": "affected", "version": "2.0(2f)" }, { "status": "affected", "version": "2.3(1e)" }, { "status": "affected", "version": "1.1(1s)" }, { "status": "affected", "version": "3.1(2v)" }, { "status": "affected", "version": "4.1(2w)" }, { "status": "affected", "version": "1.1(4i)" }, { "status": "affected", "version": "3.1(2u)" }, { "status": "affected", "version": "1.1(4f)" }, { "status": "affected", "version": "3.0(2m)" }, { "status": "affected", "version": "2.0(1k)" }, { "status": "affected", "version": "3.2(2o)" }, { "status": "affected", "version": "3.2(3r)" }, { "status": "affected", "version": "1.1(2i)" }, { "status": "affected", "version": "4.0(2c)" }, { "status": "affected", "version": "1.3(1i)" }, { "status": "affected", "version": "4.1(2s)" }, { "status": "affected", "version": "3.2(7f)" }, { "status": "affected", "version": "1.2(3m)" }, { "status": "affected", "version": "3.2(3o)" }, { "status": "affected", "version": "3.1(2s)" }, { "status": "affected", "version": "3.2(2l)" }, { "status": "affected", "version": "4.2(1j)" }, { "status": "affected", "version": "2.3(1p)" }, { "status": "affected", "version": "2.1(4a)" }, { "status": "affected", "version": "1.1(1n)" }, { "status": "affected", "version": "2.2(1n)" }, { "status": "affected", "version": "2.2(4p)" }, { "status": "affected", "version": "2.1(3j)" }, { "status": "affected", "version": "4.2(4i)" }, { "status": "affected", "version": "3.2(9h)" }, { "status": "affected", "version": "5.0(1k)" }, { "status": "affected", "version": "4.2(4k)" }, { "status": "affected", "version": "5.0(1l)" }, { "status": "affected", "version": "5.0(2e)" }, { "status": "affected", "version": "4.2(4o)" }, { "status": "affected", "version": "4.2(4p)" }, { "status": "affected", "version": "5.0(2h)" }, { "status": "affected", "version": "4.2(5k)" }, { "status": "affected", "version": "4.2(5l)" }, { "status": "affected", "version": "4.2(5n)" }, { "status": "affected", "version": "5.1(1h)" }, { "status": "affected", "version": "4.2(6d)" }, { "status": "affected", "version": "5.1(2e)" }, { "status": "affected", "version": "4.2(6g)" }, { "status": "affected", "version": "4.2(6h)" }, { "status": "affected", "version": "5.1(3e)" }, { "status": "affected", "version": "3.2(10e)" }, { "status": "affected", "version": "4.2(6l)" }, { "status": "affected", "version": "4.2(7f)" }, { "status": "affected", "version": "5.1(4c)" }, { "status": "affected", "version": "4.2(6o)" }, { "status": "affected", "version": "5.2(1g)" }, { "status": "affected", "version": "5.2(2e)" }, { "status": "affected", "version": "4.2(7l)" }, { "status": "affected", "version": "3.2(10f)" }, { "status": "affected", "version": "5.2(2f)" }, { "status": "affected", "version": "5.2(2g)" }, { "status": "affected", "version": "4.2(7q)" }, { "status": "affected", "version": "5.2(2h)" }, { "status": "affected", "version": "5.2(3f)" }, { "status": "affected", "version": "5.2(3e)" }, { "status": "affected", "version": "5.2(3g)" }, { "status": "affected", "version": "4.2(7r)" }, { "status": "affected", "version": "4.2(7s)" }, { "status": "affected", "version": "5.2(4d)" }, { "status": "affected", "version": "5.2(4e)" }, { "status": "affected", "version": "4.2(7t)" }, { "status": "affected", "version": "5.2(5d)" }, { "status": "affected", "version": "3.2(10g)" }, { "status": "affected", "version": "5.2(5c)" }, { "status": "affected", "version": "6.0(1g)" }, { "status": "affected", "version": "4.2(7u)" }, { "status": "affected", "version": "5.2(5e)" }, { "status": "affected", "version": "5.2(4f)" }, { "status": "affected", "version": "5.2(6e)" }, { "status": "affected", "version": "6.0(1j)" }, { "status": "affected", "version": "5.2(6g)" }, { "status": "affected", "version": "5.2(7f)" }, { "status": "affected", "version": "4.2(7v)" }, { "status": "affected", "version": "5.2(7g)" }, { "status": "affected", "version": "6.0(2h)" }, { "status": "affected", "version": "4.2(7w)" }, { "status": "affected", "version": "5.2(6h)" }, { "status": "affected", "version": "5.2(4h)" }, { "status": "affected", "version": "5.2(8d)" }, { "status": "affected", "version": "6.0(2j)" }, { "status": "affected", "version": "5.2(8e)" }, { "status": "affected", "version": "6.0(3d)" }, { "status": "affected", "version": "6.0(3e)" }, { "status": "affected", "version": "5.2(8f)" }, { "status": "affected", "version": "5.2(8g)" }, { "status": "affected", "version": "5.3(1d)" }, { "status": "affected", "version": "5.2(8h)" }, { "status": "affected", "version": "6.0(4c)" }, { "status": "affected", "version": "5.3(2a)" }, { "status": "affected", "version": "5.2(8i)" }, { "status": "affected", "version": "6.0(5h)" }, { "status": "affected", "version": "5.3(2b)" }, { "status": "affected", "version": "6.0(3g)" }, { "status": "affected", "version": "6.0(5j)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to modify the behavior of default system policies, such as quality of service (QoS) policies, on an affected system.\u0026nbsp;This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete child policies created under default system policies, which are implicitly used by all tenants in the fabric, resulting in disruption of network traffic. Exploitation is not possible for policies under tenants that an attacker has no authorization to access." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-28T16:19:08.343Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-apic-cousmo-uBpBYGbq", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-cousmo-uBpBYGbq" } ], "source": { "advisory": "cisco-sa-apic-cousmo-uBpBYGbq", "defects": [ "CSCwe67288" ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller Unauthorized Policy Actions Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20279", "datePublished": "2024-08-28T16:19:08.343Z", "dateReserved": "2023-11-08T15:08:07.625Z", "dateUpdated": "2024-08-28T17:54:51.419Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1690
Vulnerability from cvelistv5
Published
2019-03-11 22:00
Modified
2024-11-21 19:42
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller IPv6 Link-Local Address Vulnerability
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/107317 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-apic-ipv6 | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:41.061Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "107317", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107317" }, { "name": "20190306 Cisco Application Policy Infrastructure Controller IPv6 Link-Local Address Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-apic-ipv6" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1690", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:59:59.996279Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:42:40.791Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "lessThan": "4.2(0.21c)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the management interface of Cisco Application Policy Infrastructure Controller (APIC) software could allow an unauthenticated, adjacent attacker to gain unauthorized access on an affected device. The vulnerability is due to a lack of proper access control mechanisms for IPv6 link-local connectivity imposed on the management interface of an affected device. An attacker on the same physical network could exploit this vulnerability by attempting to connect to the IPv6 link-local address on the affected device. A successful exploit could allow the attacker to bypass default access control restrictions on an affected device. Cisco Application Policy Infrastructure Controller (APIC) devices running versions prior to 4.2(0.21c) are affected." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-12T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "107317", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107317" }, { "name": "20190306 Cisco Application Policy Infrastructure Controller IPv6 Link-Local Address Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-apic-ipv6" } ], "source": { "advisory": "cisco-sa-20190306-apic-ipv6", "defect": [ [ "CSCvn09855" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller IPv6 Link-Local Address Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1690", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller IPv6 Link-Local Address Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.2(0.21c)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the management interface of Cisco Application Policy Infrastructure Controller (APIC) software could allow an unauthenticated, adjacent attacker to gain unauthorized access on an affected device. The vulnerability is due to a lack of proper access control mechanisms for IPv6 link-local connectivity imposed on the management interface of an affected device. An attacker on the same physical network could exploit this vulnerability by attempting to connect to the IPv6 link-local address on the affected device. A successful exploit could allow the attacker to bypass default access control restrictions on an affected device. Cisco Application Policy Infrastructure Controller (APIC) devices running versions prior to 4.2(0.21c) are affected." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.3", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "107317", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107317" }, { "name": "20190306 Cisco Application Policy Infrastructure Controller IPv6 Link-Local Address Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-apic-ipv6" } ] }, "source": { "advisory": "cisco-sa-20190306-apic-ipv6", "defect": [ [ "CSCvn09855" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1690", "datePublished": "2019-03-11T22:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:42:40.791Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3335
Vulnerability from cvelistv5
Published
2020-06-03 17:56
Modified
2024-11-15 17:10
Severity ?
EPSS score ?
Summary
Cisco Application Services Engine Software Authorization Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-KSV-3wzbHYT4 | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:57.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200603 Cisco Application Services Engine Software Authorization Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-KSV-3wzbHYT4" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3335", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:27:47.044971Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:10:20.742Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the key store of Cisco Application Services Engine Software could allow an authenticated, local attacker to read sensitive information of other users on an affected device. The vulnerability is due to insufficient authorization limitations. An attacker could exploit this vulnerability by logging in to an affected device locally with valid credentials. A successful exploit could allow the attacker to read the sensitive information of other users on the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-03T17:56:32", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200603 Cisco Application Services Engine Software Authorization Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-KSV-3wzbHYT4" } ], "source": { "advisory": "cisco-sa-APIC-KSV-3wzbHYT4", "defect": [ [ "CSCvs12529" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Services Engine Software Authorization Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-03T16:00:00", "ID": "CVE-2020-3335", "STATE": "PUBLIC", "TITLE": "Cisco Application Services Engine Software Authorization Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the key store of Cisco Application Services Engine Software could allow an authenticated, local attacker to read sensitive information of other users on an affected device. The vulnerability is due to insufficient authorization limitations. An attacker could exploit this vulnerability by logging in to an affected device locally with valid credentials. A successful exploit could allow the attacker to read the sensitive information of other users on the affected device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.5", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306" } ] } ] }, "references": { "reference_data": [ { "name": "20200603 Cisco Application Services Engine Software Authorization Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-KSV-3wzbHYT4" } ] }, "source": { "advisory": "cisco-sa-APIC-KSV-3wzbHYT4", "defect": [ [ "CSCvs12529" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3335", "datePublished": "2020-06-03T17:56:32.755543Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:10:20.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1580
Vulnerability from cvelistv5
Published
2021-08-25 19:10
Modified
2024-11-07 22:03
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:18:10.400Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1580", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:43:22.758611Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T22:03:03.767Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow a remote attacker to perform a command injection or file upload attack on an affected system. For more information about these vulnerabilities, see the Details section of this advisory." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-25T19:10:31", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW" } ], "source": { "advisory": "cisco-sa-capic-mdvul-HBsJBuvW", "defect": [ [ "CSCvw57577", "CSCvw57581" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-08-25T16:00:00", "ID": "CVE-2021-1580", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow a remote attacker to perform a command injection or file upload attack on an affected system. For more information about these vulnerabilities, see the Details section of this advisory." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW" } ] }, "source": { "advisory": "cisco-sa-capic-mdvul-HBsJBuvW", "defect": [ [ "CSCvw57577", "CSCvw57581" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1580", "datePublished": "2021-08-25T19:10:31.931588Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-07T22:03:03.767Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1587
Vulnerability from cvelistv5
Published
2019-05-03 14:45
Modified
2024-11-21 19:36
Severity ?
EPSS score ?
Summary
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Filter Query Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-filter-query | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190501 Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Filter Query Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-filter-query" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1587", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:59:08.475465Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:36:31.794Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "lessThan": "4.2(0.33c)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, remote attacker to access sensitive information. The vulnerability occurs because the affected software does not properly validate user-supplied input. An attacker could exploit this vulnerability by issuing certain commands with filtered query results on the device. This action may cause returned messages to display confidential system information. A successful exploit could allow the attacker to read sensitive information on the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-03T14:45:15", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190501 Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Filter Query Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-filter-query" } ], "source": { "advisory": "cisco-sa-20190501-aci-filter-query", "defect": [ [ "CSCvn09825" ] ], "discovery": "INTERNAL" }, "title": "Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Filter Query Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-01T16:00:00-0700", "ID": "CVE-2019-1587", "STATE": "PUBLIC", "TITLE": "Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Filter Query Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.2(0.33c)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, remote attacker to access sensitive information. The vulnerability occurs because the affected software does not properly validate user-supplied input. An attacker could exploit this vulnerability by issuing certain commands with filtered query results on the device. This action may cause returned messages to display confidential system information. A successful exploit could allow the attacker to read sensitive information on the device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.3", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "20190501 Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Filter Query Information Disclosure Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-filter-query" } ] }, "source": { "advisory": "cisco-sa-20190501-aci-filter-query", "defect": [ [ "CSCvn09825" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1587", "datePublished": "2019-05-03T14:45:15.900409Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:36:31.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1578
Vulnerability from cvelistv5
Published
2021-08-25 19:10
Modified
2024-11-07 22:03
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-pesc-pkmGK4J | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:18:10.274Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-pesc-pkmGK4J" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1578", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:43:24.747573Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T22:03:16.741Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker to elevate privileges to Administrator on an affected device. This vulnerability is due to an improper policy default setting. An attacker could exploit this vulnerability by using a non-privileged credential for Cisco ACI Multi-Site Orchestrator (MSO) to send a specific API request to a managed Cisco APIC or Cloud APIC device. A successful exploit could allow the attacker to obtain Administrator credentials on the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-636", "description": "CWE-636", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-25T19:10:21", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-pesc-pkmGK4J" } ], "source": { "advisory": "cisco-sa-capic-pesc-pkmGK4J", "defect": [ [ "CSCvw57550" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-08-25T16:00:00", "ID": "CVE-2021-1578", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker to elevate privileges to Administrator on an affected device. This vulnerability is due to an improper policy default setting. An attacker could exploit this vulnerability by using a non-privileged credential for Cisco ACI Multi-Site Orchestrator (MSO) to send a specific API request to a managed Cisco APIC or Cloud APIC device. A successful exploit could allow the attacker to obtain Administrator credentials on the affected device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.8", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-636" } ] } ] }, "references": { "reference_data": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-pesc-pkmGK4J" } ] }, "source": { "advisory": "cisco-sa-capic-pesc-pkmGK4J", "defect": [ [ "CSCvw57550" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1578", "datePublished": "2021-08-25T19:10:21.106709Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-07T22:03:16.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1586
Vulnerability from cvelistv5
Published
2019-05-03 14:45
Modified
2024-11-21 19:36
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller Recoverable Encryption Key Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-encrypt | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108158 | vdb-entry, x_refsource_BID |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.304Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190501 Cisco Application Policy Infrastructure Controller Recoverable Encryption Key Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-encrypt" }, { "name": "108158", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1586", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:59:06.739629Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:36:20.282Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "lessThan": "4.2(0.33c)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an unauthenticated, local attacker with physical access to obtain sensitive information from an affected device. The vulnerability is due to insecure removal of cleartext encryption keys stored on local partitions in the hard drive of an affected device. An attacker could exploit this vulnerability by retrieving data from the physical disk on the affected partition(s). A successful exploit could allow the attacker to retrieve encryption keys, possibly allowing the attacker to further decrypt other data and sensitive information on the device, which could lead to the disclosure of confidential information." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-320", "description": "CWE-320", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-06T08:06:02", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190501 Cisco Application Policy Infrastructure Controller Recoverable Encryption Key Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-encrypt" }, { "name": "108158", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108158" } ], "source": { "advisory": "cisco-sa-20190501-apic-encrypt", "defect": [ [ "CSCvn09800" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller Recoverable Encryption Key Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-01T16:00:00-0700", "ID": "CVE-2019-1586", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller Recoverable Encryption Key Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.2(0.33c)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an unauthenticated, local attacker with physical access to obtain sensitive information from an affected device. The vulnerability is due to insecure removal of cleartext encryption keys stored on local partitions in the hard drive of an affected device. An attacker could exploit this vulnerability by retrieving data from the physical disk on the affected partition(s). A successful exploit could allow the attacker to retrieve encryption keys, possibly allowing the attacker to further decrypt other data and sensitive information on the device, which could lead to the disclosure of confidential information." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.6", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-320" } ] } ] }, "references": { "reference_data": [ { "name": "20190501 Cisco Application Policy Infrastructure Controller Recoverable Encryption Key Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-encrypt" }, { "name": "108158", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108158" } ] }, "source": { "advisory": "cisco-sa-20190501-apic-encrypt", "defect": [ [ "CSCvn09800" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1586", "datePublished": "2019-05-03T14:45:23.327064Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:36:20.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3139
Vulnerability from cvelistv5
Published
2020-01-26 04:30
Modified
2024-11-15 17:47
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller Out Of Band Management IP Tables Bypass Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iptable-bypass-GxW88XjL | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:24:00.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200122 Cisco Application Policy Infrastructure Controller Out Of Band Management IP Tables Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iptable-bypass-GxW88XjL" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3139", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:22:45.816726Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:47:01.043Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "prior to 4.2(3j)" } ] } ], "datePublic": "2020-01-22T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the out of band (OOB) management interface IP table rule programming for Cisco Application Policy Infrastructure Controller (APIC) could allow an unauthenticated, remote attacker to bypass configured deny entries for specific IP ports. These IP ports would be permitted to the OOB management interface when, in fact, the packets should be dropped. The vulnerability is due to the configuration of specific IP table entries for which there is a programming logic error that results in the IP port being permitted. An attacker could exploit this vulnerability by sending traffic to the OOB management interface on the targeted device. A successful exploit could allow the attacker to bypass configured IP table rules to drop specific IP port traffic. The attacker has no control over the configuration of the device itself. This vulnerability affects Cisco APIC releases prior to the first fixed software Release 4.2(3j)." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-27T22:10:14", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200122 Cisco Application Policy Infrastructure Controller Out Of Band Management IP Tables Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iptable-bypass-GxW88XjL" } ], "source": { "advisory": "cisco-sa-iptable-bypass-GxW88XjL", "defect": [ [ "CSCvs10135" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller Out Of Band Management IP Tables Bypass Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-01-22T16:00:00-0800", "ID": "CVE-2020-3139", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller Out Of Band Management IP Tables Bypass Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "version_value": "prior to 4.2(3j)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the out of band (OOB) management interface IP table rule programming for Cisco Application Policy Infrastructure Controller (APIC) could allow an unauthenticated, remote attacker to bypass configured deny entries for specific IP ports. These IP ports would be permitted to the OOB management interface when, in fact, the packets should be dropped. The vulnerability is due to the configuration of specific IP table entries for which there is a programming logic error that results in the IP port being permitted. An attacker could exploit this vulnerability by sending traffic to the OOB management interface on the targeted device. A successful exploit could allow the attacker to bypass configured IP table rules to drop specific IP port traffic. The attacker has no control over the configuration of the device itself. This vulnerability affects Cisco APIC releases prior to the first fixed software Release 4.2(3j)." } ] }, "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200122 Cisco Application Policy Infrastructure Controller Out Of Band Management IP Tables Bypass Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iptable-bypass-GxW88XjL" } ] }, "source": { "advisory": "cisco-sa-iptable-bypass-GxW88XjL", "defect": [ [ "CSCvs10135" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3139", "datePublished": "2020-01-26T04:30:28.596189Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:47:01.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1581
Vulnerability from cvelistv5
Published
2021-08-25 19:10
Modified
2024-11-07 22:02
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:18:10.335Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1581", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:43:21.162441Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T22:02:57.346Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow a remote attacker to perform a command injection or file upload attack on an affected system. For more information about these vulnerabilities, see the Details section of this advisory." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-25T19:10:37", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW" } ], "source": { "advisory": "cisco-sa-capic-mdvul-HBsJBuvW", "defect": [ [ "CSCvw57577", "CSCvw57581" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-08-25T16:00:00", "ID": "CVE-2021-1581", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow a remote attacker to perform a command injection or file upload attack on an affected system. For more information about these vulnerabilities, see the Details section of this advisory." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW" } ] }, "source": { "advisory": "cisco-sa-capic-mdvul-HBsJBuvW", "defect": [ [ "CSCvw57577", "CSCvw57581" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1581", "datePublished": "2021-08-25T19:10:37.354733Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-07T22:02:57.346Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1682
Vulnerability from cvelistv5
Published
2019-05-03 14:55
Modified
2024-11-20 17:23
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-priv-escalation | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:41.080Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190501 Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-priv-escalation" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1682", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:55:17.988446Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:23:53.756Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "lessThan": "4.1(1i)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the FUSE filesystem functionality for Cisco Application Policy Infrastructure Controller (APIC) software could allow an authenticated, local attacker to escalate privileges to root on an affected device. The vulnerability is due to insufficient input validation for certain command strings issued on the CLI of the affected device. An attacker with write permissions for files within a readable folder on the device could alter certain definitions in the affected file. A successful exploit could allow an attacker to cause the underlying FUSE driver to execute said crafted commands, elevating the attacker\u0027s privileges to root on an affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-03T14:55:17", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190501 Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-priv-escalation" } ], "source": { "advisory": "cisco-sa-20190501-apic-priv-escalation", "defect": [ [ "CSCvn09779" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-01T16:00:00-0700", "ID": "CVE-2019-1682", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.1(1i)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the FUSE filesystem functionality for Cisco Application Policy Infrastructure Controller (APIC) software could allow an authenticated, local attacker to escalate privileges to root on an affected device. The vulnerability is due to insufficient input validation for certain command strings issued on the CLI of the affected device. An attacker with write permissions for files within a readable folder on the device could alter certain definitions in the affected file. A successful exploit could allow an attacker to cause the underlying FUSE driver to execute said crafted commands, elevating the attacker\u0027s privileges to root on an affected device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.8", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "20190501 Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-priv-escalation" } ] }, "source": { "advisory": "cisco-sa-20190501-apic-priv-escalation", "defect": [ [ "CSCvn09779" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1682", "datePublished": "2019-05-03T14:55:17.600857Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:23:53.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3333
Vulnerability from cvelistv5
Published
2020-06-03 17:56
Modified
2024-11-15 17:10
Severity ?
EPSS score ?
Summary
Cisco Application Services Engine Software Unauthenticated Event Policies Update Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-EPU-F8y5kUOP | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:58.016Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200603 Cisco Application Services Engine Software Unauthenticated Event Policies Update Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-EPU-F8y5kUOP" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3333", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:21:12.241950Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:10:30.293Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the API of Cisco Application Services Engine Software could allow an unauthenticated, remote attacker to update event policies on an affected device. The vulnerability is due to insufficient authentication of users who modify policies on an affected device. An attacker could exploit this vulnerability by crafting a malicious HTTP request to contact an affected device. A successful exploit could allow the attacker to update event policies on the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-03T17:56:27", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200603 Cisco Application Services Engine Software Unauthenticated Event Policies Update Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-EPU-F8y5kUOP" } ], "source": { "advisory": "cisco-sa-APIC-EPU-F8y5kUOP", "defect": [ [ "CSCvs12541" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Services Engine Software Unauthenticated Event Policies Update Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-03T16:00:00", "ID": "CVE-2020-3333", "STATE": "PUBLIC", "TITLE": "Cisco Application Services Engine Software Unauthenticated Event Policies Update Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the API of Cisco Application Services Engine Software could allow an unauthenticated, remote attacker to update event policies on an affected device. The vulnerability is due to insufficient authentication of users who modify policies on an affected device. An attacker could exploit this vulnerability by crafting a malicious HTTP request to contact an affected device. A successful exploit could allow the attacker to update event policies on the affected device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306" } ] } ] }, "references": { "reference_data": [ { "name": "20200603 Cisco Application Services Engine Software Unauthenticated Event Policies Update Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-APIC-EPU-F8y5kUOP" } ] }, "source": { "advisory": "cisco-sa-APIC-EPU-F8y5kUOP", "defect": [ [ "CSCvs12541" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3333", "datePublished": "2020-06-03T17:56:27.583868Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:10:30.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1579
Vulnerability from cvelistv5
Published
2021-08-25 19:10
Modified
2024-11-07 22:03
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8 | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:18:10.265Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1579", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:40:57.799938Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T22:03:10.302Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "CWE-250", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-25T19:10:26", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8" } ], "source": { "advisory": "cisco-sa-capic-chvul-CKfGYBh8", "defect": [ [ "CSCvw57164" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-08-25T16:00:00", "ID": "CVE-2021-1579", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-250" } ] } ] }, "references": { "reference_data": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8" } ] }, "source": { "advisory": "cisco-sa-capic-chvul-CKfGYBh8", "defect": [ [ "CSCvw57164" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1579", "datePublished": "2021-08-25T19:10:26.575278Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-07T22:03:10.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20230
Vulnerability from cvelistv5
Published
2023-08-23 18:21
Modified
2024-10-01 15:53
Severity ?
EPSS score ?
Summary
A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to read, modify, or delete non-tenant policies (for example, access policies) created by users associated with a different security domain on an affected system.
This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy for policies outside the tenant boundaries. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete policies created by users associated with a different security domain. Exploitation is not possible for policies under tenants that an attacker has no authorization to access.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.936Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-apic-uapa-F4TAShk", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-uapa-F4TAShk" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20230", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-01T15:11:19.252551Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T15:53:16.612Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "5.2(6e)" }, { "status": "affected", "version": "5.2(6g)" }, { "status": "affected", "version": "5.2(7f)" }, { "status": "affected", "version": "5.2(7g)" }, { "status": "affected", "version": "6.0(1g)" }, { "status": "affected", "version": "6.0(1j)" }, { "status": "affected", "version": "6.0(2h)" }, { "status": "affected", "version": "6.0(2j)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to read, modify, or delete non-tenant policies (for example, access policies) created by users associated with a different security domain on an affected system.\r\n\r This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy for policies outside the tenant boundaries. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete policies created by users associated with a different security domain. Exploitation is not possible for policies under tenants that an attacker has no authorization to access." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:58:26.252Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-apic-uapa-F4TAShk", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-uapa-F4TAShk" } ], "source": { "advisory": "cisco-sa-apic-uapa-F4TAShk", "defects": [ "CSCwe56828" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20230", "datePublished": "2023-08-23T18:21:39.489Z", "dateReserved": "2022-10-27T18:47:50.369Z", "dateUpdated": "2024-10-01T15:53:16.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1692
Vulnerability from cvelistv5
Published
2019-05-03 15:00
Modified
2024-11-19 19:09
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller Web-Based Management Interface Usage Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-info-disc | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108155 | vdb-entry, x_refsource_BID |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:41.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190501 Cisco Application Policy Infrastructure Controller Web-Based Management Interface Usage Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-info-disc" }, { "name": "108155", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108155" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1692", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:24:32.211588Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:09:45.954Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "lessThan": "4.1(1i)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Application Policy Infrastructure Controller (APIC) Software could allow an unauthenticated, remote attacker to access sensitive system usage information. The vulnerability is due to a lack of proper data protection mechanisms for certain components in the underlying Application Centric Infrastructure (ACI). An attacker could exploit this vulnerability by attempting to observe certain network traffic when accessing the APIC. A successful exploit could allow the attacker to access and collect certain tracking data and usage statistics on an affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-06T10:06:02", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190501 Cisco Application Policy Infrastructure Controller Web-Based Management Interface Usage Information Disclosure Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-info-disc" }, { "name": "108155", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108155" } ], "source": { "advisory": "cisco-sa-20190501-apic-info-disc", "defect": [ [ "CSCvn09869" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller Web-Based Management Interface Usage Information Disclosure Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-01T16:00:00-0700", "ID": "CVE-2019-1692", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller Web-Based Management Interface Usage Information Disclosure Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.1(1i)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco Application Policy Infrastructure Controller (APIC) Software could allow an unauthenticated, remote attacker to access sensitive system usage information. The vulnerability is due to a lack of proper data protection mechanisms for certain components in the underlying Application Centric Infrastructure (ACI). An attacker could exploit this vulnerability by attempting to observe certain network traffic when accessing the APIC. A successful exploit could allow the attacker to access and collect certain tracking data and usage statistics on an affected device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "20190501 Cisco Application Policy Infrastructure Controller Web-Based Management Interface Usage Information Disclosure Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-info-disc" }, { "name": "108155", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108155" } ] }, "source": { "advisory": "cisco-sa-20190501-apic-info-disc", "defect": [ [ "CSCvn09869" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1692", "datePublished": "2019-05-03T15:00:16.729611Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-19T19:09:45.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1889
Vulnerability from cvelistv5
Published
2019-07-04 19:55
Modified
2024-11-20 17:16
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ccapic-restapi | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:52.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190703 Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ccapic-restapi" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1889", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:53:55.592581Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:16:04.848Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "lessThan": "4.1(2g)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-07-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the REST API for software device management in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an authenticated, remote attacker to escalate privileges to root on an affected device. The vulnerability is due to incomplete validation and error checking for the file path when specific software is uploaded. An attacker could exploit this vulnerability by uploading malicious software using the REST API. A successful exploit could allow an attacker to escalate their privilege level to root. The attacker would need to have the administrator role on the device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-04T19:55:11", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190703 Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ccapic-restapi" } ], "source": { "advisory": "cisco-sa-20190703-ccapic-restapi", "defect": [ [ "CSCvp64857" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-07-03T16:00:00-0700", "ID": "CVE-2019-1889", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.1(2g)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the REST API for software device management in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an authenticated, remote attacker to escalate privileges to root on an affected device. The vulnerability is due to incomplete validation and error checking for the file path when specific software is uploaded. An attacker could exploit this vulnerability by uploading malicious software using the REST API. A successful exploit could allow an attacker to escalate their privilege level to root. The attacker would need to have the administrator role on the device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.2", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "20190703 Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-ccapic-restapi" } ] }, "source": { "advisory": "cisco-sa-20190703-ccapic-restapi", "defect": [ [ "CSCvp64857" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1889", "datePublished": "2019-07-04T19:55:11.106733Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:16:04.848Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1577
Vulnerability from cvelistv5
Published
2021-08-25 19:10
Modified
2024-11-07 22:03
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller Arbitrary File Read and Write Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-frw-Nt3RYxR2 | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:18:10.357Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Arbitrary File Read and Write Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-frw-Nt3RYxR2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1577", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:55:57.285103Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T22:03:22.774Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an unauthenticated, remote attacker to read or write arbitrary files on an affected system. This vulnerability is due to improper access control. An attacker could exploit this vulnerability by using a specific API endpoint to upload a file to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on an affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-25T19:10:15", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Arbitrary File Read and Write Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-frw-Nt3RYxR2" } ], "source": { "advisory": "cisco-sa-capic-frw-Nt3RYxR2", "defect": [ [ "CSCvw57556" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller Arbitrary File Read and Write Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-08-25T16:00:00", "ID": "CVE-2021-1577", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller Arbitrary File Read and Write Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an unauthenticated, remote attacker to read or write arbitrary files on an affected system. This vulnerability is due to improper access control. An attacker could exploit this vulnerability by using a specific API endpoint to upload a file to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on an affected device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "9.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Arbitrary File Read and Write Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-frw-Nt3RYxR2" } ] }, "source": { "advisory": "cisco-sa-capic-frw-Nt3RYxR2", "defect": [ [ "CSCvw57556" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1577", "datePublished": "2021-08-25T19:10:15.614467Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-07T22:03:22.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20478
Vulnerability from cvelistv5
Published
2024-08-28 16:30
Modified
2024-09-06 14:11
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(8d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(1o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(1k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(1k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(41d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(1m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(4r\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(3f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(4f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(3h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1r\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3r\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(2k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(3g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(1h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2t\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(2k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2u\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2q\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2q\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(2n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(1h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(1h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(1k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1q\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1r\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(6i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(4q\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(2j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(3t\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2x\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3q\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2v\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2w\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2u\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(4f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.0\\(2m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3r\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(2i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(2c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3m\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.1\\(2s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.3\\(1p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\\(1n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(1n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.2\\(4p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.1\\(3j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4p\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(1h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(3e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(4c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(1g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7q\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7r\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7s\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7t\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7u\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7v\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7w\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(1d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(4c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2c\\):*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "application_policy_infrastructure_controller", "vendor": "cisco", "versions": [ { "status": "affected", "version": "3.2\\(8d\\)" }, { "status": "affected", "version": "2.2\\(1o\\)" }, { "status": "affected", "version": "1.2\\(2h\\)" }, { "status": "affected", "version": "2.2\\(2i\\)" }, { "status": "affected", "version": "1.2\\(1k\\)" }, { "status": "affected", "version": "2.2\\(1k\\)" }, { "status": "affected", "version": "3.1\\(2m\\)" }, { "status": "affected", "version": "3.2\\(1m\\)" }, { "status": "affected", "version": "3.2\\(5e\\)" }, { "status": "affected", "version": "4.1\\(2m\\)" }, { "status": "affected", "version": "3.2\\(41d\\)" }, { "status": "affected", "version": "1.1\\(1o\\)" }, { "status": "affected", "version": "1.2\\(1m\\)" }, { "status": "affected", "version": "1.2\\(2j\\)" }, { "status": "affected", "version": "2.2\\(4r\\)" }, { "status": "affected", "version": "2.2\\(3j\\)" }, { "status": "affected", "version": "1.1\\(3f\\)" }, { "status": "affected", "version": "2.2\\(2f\\)" }, { "status": "affected", "version": "1.1\\(4m\\)" }, { "status": "affected", "version": "2.2\\(2k\\)" }, { "status": "affected", "version": "2.1\\(1i\\)" }, { "status": "affected", "version": "2.0\\(1p\\)" }, { "status": "affected", "version": "3.1\\(2p\\)" }, { "status": "affected", "version": "3.2\\(3s\\)" }, { "status": "affected", "version": "4.0\\(3c\\)" }, { "status": "affected", "version": "1.1\\(4e\\)" }, { "status": "affected", "version": "4.1\\(1k\\)" }, { "status": "affected", "version": "2.2\\(4f\\)" }, { "status": "affected", "version": "2.1\\(3h\\)" }, { "status": "affected", "version": "3.2\\(4d\\)" }, { "status": "affected", "version": "2.0\\(1n\\)" }, { "status": "affected", "version": "2.0\\(1m\\)" }, { "status": "affected", "version": "2.0\\(1r\\)" }, { "status": "affected", "version": "2.1\\(2e\\)" }, { "status": "affected", "version": "4.2\\(2e\\)" }, { "status": "affected", "version": "4.2\\(3j\\)" }, { "status": "affected", "version": "4.2\\(3n\\)" }, { "status": "affected", "version": "2.0\\(1l\\)" }, { "status": "affected", "version": "2.2\\(2e\\)" }, { "status": "affected", "version": "2.2\\(3r\\)" }, { "status": "affected", "version": "3.0\\(2k\\)" }, { "status": "affected", "version": "2.1\\(3g\\)" }, { "status": "affected", "version": "4.0\\(1h\\)" }, { "status": "affected", "version": "2.0\\(1o\\)" }, { "status": "affected", "version": "2.2\\(3p\\)" }, { "status": "affected", "version": "1.2\\(3e\\)" }, { "status": "affected", "version": "2.2\\(3s\\)" }, { "status": "affected", "version": "2.0\\(2g\\)" }, { "status": "affected", "version": "4.1\\(1l\\)" }, { "status": "affected", "version": "3.2\\(9f\\)" }, { "status": "affected", "version": "4.2\\(3l\\)" }, { "status": "affected", "version": "4.2\\(2g\\)" }, { "status": "affected", "version": "1.2\\(3c\\)" }, { "status": "affected", "version": "3.2\\(7k\\)" }, { "status": "affected", "version": "1.3\\(2h\\)" }, { "status": "affected", "version": "3.2\\(9b\\)" }, { "status": "affected", "version": "1.3\\(2k\\)" }, { "status": "affected", "version": "3.1\\(2t\\)" }, { "status": "affected", "version": "1.1\\(2h\\)" }, { "status": "affected", "version": "3.2\\(3j\\)" }, { "status": "affected", "version": "2.1\\(2k\\)" }, { "status": "affected", "version": "2.3\\(1f\\)" }, { "status": "affected", "version": "1.2\\(3h\\)" }, { "status": "affected", "version": "3.0\\(1i\\)" }, { "status": "affected", "version": "4.1\\(2u\\)" }, { "status": "affected", "version": "4.2\\(1l\\)" }, { "status": "affected", "version": "4.1\\(1a\\)" }, { "status": "affected", "version": "4.0\\(3d\\)" }, { "status": "affected", "version": "1.1\\(4l\\)" }, { "status": "affected", "version": "2.3\\(1i\\)" }, { "status": "affected", "version": "3.1\\(2q\\)" }, { "status": "affected", "version": "3.2\\(4e\\)" }, { "status": "affected", "version": "4.1\\(1i\\)" }, { "status": "affected", "version": "3.1\\(1i\\)" }, { "status": "affected", "version": "2.0\\(2m\\)" }, { "status": "affected", "version": "3.0\\(2h\\)" }, { "status": "affected", "version": "2.2\\(2q\\)" }, { "status": "affected", "version": "2.3\\(1l\\)" }, { "status": "affected", "version": "1.3\\(1h\\)" }, { "status": "affected", "version": "3.0\\(2n\\)" }, { "status": "affected", "version": "3.2\\(5f\\)" }, { "status": "affected", "version": "1.2\\(1h\\)" }, { "status": "affected", "version": "3.2\\(1l\\)" }, { "status": "affected", "version": "4.2\\(1i\\)" }, { "status": "affected", "version": "4.1\\(2o\\)" }, { "status": "affected", "version": "1.2\\(1i\\)" }, { "status": "affected", "version": "1.3\\(1j\\)" }, { "status": "affected", "version": "2.1\\(1h\\)" }, { "status": "affected", "version": "2.0\\(2l\\)" }, { "status": "affected", "version": "2.0\\(2h\\)" }, { "status": "affected", "version": "1.2\\(2g\\)" }, { "status": "affected", "version": "3.0\\(1k\\)" }, { "status": "affected", "version": "4.2\\(1g\\)" }, { "status": "affected", "version": "2.1\\(2g\\)" }, { "status": "affected", "version": "2.0\\(1q\\)" }, { "status": "affected", "version": "1.1\\(1j\\)" }, { "status": "affected", "version": "4.1\\(2g\\)" }, { "status": "affected", "version": "1.1\\(1r\\)" }, { "status": "affected", "version": "4.2\\(2f\\)" }, { "status": "affected", "version": "3.2\\(6i\\)" }, { "status": "affected", "version": "1.3\\(1g\\)" }, { "status": "affected", "version": "1.3\\(2j\\)" }, { "status": "affected", "version": "1.3\\(2i\\)" }, { "status": "affected", "version": "2.0\\(2o\\)" }, { "status": "affected", "version": "2.2\\(4q\\)" }, { "status": "affected", "version": "2.3\\(1o\\)" }, { "status": "affected", "version": "3.2\\(3i\\)" }, { "status": "affected", "version": "2.2\\(2j\\)" }, { "status": "affected", "version": "1.1\\(1d\\)" }, { "status": "affected", "version": "2.0\\(2n\\)" }, { "status": "affected", "version": "2.2\\(3t\\)" }, { "status": "affected", "version": "3.2\\(3n\\)" }, { "status": "affected", "version": "1.1\\(4g\\)" }, { "status": "affected", "version": "4.1\\(2x\\)" }, { "status": "affected", "version": "3.2\\(5d\\)" }, { "status": "affected", "version": "3.1\\(2o\\)" }, { "status": "affected", "version": "1.2\\(2i\\)" }, { "status": "affected", "version": "2.1\\(2f\\)" }, { "status": "affected", "version": "1.3\\(2f\\)" }, { "status": "affected", "version": "4.2\\(3q\\)" }, { "status": "affected", "version": "4.1\\(1j\\)" }, { "status": "affected", "version": "2.0\\(2f\\)" }, { "status": "affected", "version": "2.3\\(1e\\)" }, { "status": "affected", "version": "1.1\\(1s\\)" }, { "status": "affected", "version": "3.1\\(2v\\)" }, { "status": "affected", "version": "4.1\\(2w\\)" }, { "status": "affected", "version": "1.1\\(4i\\)" }, { "status": "affected", "version": "3.1\\(2u\\)" }, { "status": "affected", "version": "1.1\\(4f\\)" }, { "status": "affected", "version": "3.0\\(2m\\)" }, { "status": "affected", "version": "2.0\\(1k\\)" }, { "status": "affected", "version": "3.2\\(2o\\)" }, { "status": "affected", "version": "3.2\\(3r\\)" }, { "status": "affected", "version": "1.1\\(2i\\)" }, { "status": "affected", "version": "4.0\\(2c\\)" }, { "status": "affected", "version": "1.3\\(1i\\)" }, { "status": "affected", "version": "4.1\\(2s\\)" }, { "status": "affected", "version": "3.2\\(7f\\)" }, { "status": "affected", "version": "1.2\\(3m\\)" }, { "status": "affected", "version": "3.2\\(3o\\)" }, { "status": "affected", "version": "3.1\\(2s\\)" }, { "status": "affected", "version": "3.2\\(2l\\)" }, { "status": "affected", "version": "4.2\\(1j\\)" }, { "status": "affected", "version": "2.3\\(1p\\)" }, { "status": "affected", "version": "2.1\\(4a\\)" }, { "status": "affected", "version": "1.1\\(1n\\)" }, { "status": "affected", "version": "2.2\\(1n\\)" }, { "status": "affected", "version": "2.2\\(4p\\)" }, { "status": "affected", "version": "2.1\\(3j\\)" }, { "status": "affected", "version": "4.2\\(4i\\)" }, { "status": "affected", "version": "3.2\\(9h\\)" }, { "status": "affected", "version": "5.0\\(1k\\)" }, { "status": "affected", "version": "4.2\\(4k\\)" }, { "status": "affected", "version": "5.0\\(1l\\)" }, { "status": "affected", "version": "5.0\\(2e\\)" }, { "status": "affected", "version": "4.2\\(4o\\)" }, { "status": "affected", "version": "4.2\\(4p\\)" }, { "status": "affected", "version": "5.0\\(2h\\)" }, { "status": "affected", "version": "4.2\\(5k\\)" }, { "status": "affected", "version": "4.2\\(5l\\)" }, { "status": "affected", "version": "4.2\\(5n\\)" }, { "status": "affected", "version": "5.1\\(1h\\)" }, { "status": "affected", "version": "4.2\\(6d\\)" }, { "status": "affected", "version": "5.1\\(2e\\)" }, { "status": "affected", "version": "4.2\\(6g\\)" }, { "status": "affected", "version": "4.2\\(6h\\)" }, { "status": "affected", "version": "5.1\\(3e\\)" }, { "status": "affected", "version": "3.2\\(10e\\)" }, { "status": "affected", "version": "4.2\\(6l\\)" }, { "status": "affected", "version": "4.2\\(7f\\)" }, { "status": "affected", "version": "5.1\\(4c\\)" }, { "status": "affected", "version": "4.2\\(6o\\)" }, { "status": "affected", "version": "5.2\\(1g\\)" }, { "status": "affected", "version": "5.2\\(2e\\)" }, { "status": "affected", "version": "4.2\\(7l\\)" }, { "status": "affected", "version": "3.2\\(10f\\)" }, { "status": "affected", "version": "5.2\\(2f\\)" }, { "status": "affected", "version": "5.2\\(2g\\)" }, { "status": "affected", "version": "4.2\\(7q\\)" }, { "status": "affected", "version": "5.2\\(2h\\)" }, { "status": "affected", "version": "5.2\\(3f\\)" }, { "status": "affected", "version": "5.2\\(3e\\)" }, { "status": "affected", "version": "5.2\\(3g\\)" }, { "status": "affected", "version": "4.2\\(7r\\)" }, { "status": "affected", "version": "4.2\\(7s\\)" }, { "status": "affected", "version": "5.2\\(4d\\)" }, { "status": "affected", "version": "5.2\\(4e\\)" }, { "status": "affected", "version": "4.2\\(7t\\)" }, { "status": "affected", "version": "5.2\\(5d\\)" }, { "status": "affected", "version": "3.2\\(10g\\)" }, { "status": "affected", "version": "5.2\\(5c\\)" }, { "status": "affected", "version": "6.0\\(1g\\)" }, { "status": "affected", "version": "4.2\\(7u\\)" }, { "status": "affected", "version": "5.2\\(5e\\)" }, { "status": "affected", "version": "5.2\\(4f\\)" }, { "status": "affected", "version": "5.2\\(6e\\)" }, { "status": "affected", "version": "6.0\\(1j\\)" }, { "status": "affected", "version": "5.2\\(6g\\)" }, { "status": "affected", "version": "5.2\\(7f\\)" }, { "status": "affected", "version": "4.2\\(7v\\)" }, { "status": "affected", "version": "5.2\\(7g\\)" }, { "status": "affected", "version": "6.0\\(2h\\)" }, { "status": "affected", "version": "4.2\\(7w\\)" }, { "status": "affected", "version": "5.2\\(6h\\)" }, { "status": "affected", "version": "5.2\\(4h\\)" }, { "status": "affected", "version": "5.2\\(8d\\)" }, { "status": "affected", "version": "6.0\\(2j\\)" }, { "status": "affected", "version": "5.2\\(8e\\)" }, { "status": "affected", "version": "6.0\\(3d\\)" }, { "status": "affected", "version": "6.0\\(3e\\)" }, { "status": "affected", "version": "5.2\\(8f\\)" }, { "status": "affected", "version": "5.2\\(8g\\)" }, { "status": "affected", "version": "5.3\\(1d\\)" }, { "status": "affected", "version": "5.2\\(8h\\)" }, { "status": "affected", "version": "6.0\\(4c\\)" }, { "status": "affected", "version": "5.3\\(2a\\)" }, { "status": "affected", "version": "5.2\\(8i\\)" }, { "status": "affected", "version": "6.0\\(5h\\)" }, { "status": "affected", "version": "5.3\\(2b\\)" }, { "status": "affected", "version": "6.0\\(3g\\)" }, { "status": "affected", "version": "6.0\\(5j\\)" }, { "status": "affected", "version": "5.3\\(2c\\)" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20478", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-30T03:56:06.255702Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-06T14:11:08.951Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.2(8d)" }, { "status": "affected", "version": "2.2(1o)" }, { "status": "affected", "version": "1.2(2h)" }, { "status": "affected", "version": "2.2(2i)" }, { "status": "affected", "version": "1.2(1k)" }, { "status": "affected", "version": "2.2(1k)" }, { "status": "affected", "version": "3.1(2m)" }, { "status": "affected", "version": "3.2(1m)" }, { "status": "affected", "version": "3.2(5e)" }, { "status": "affected", "version": "4.1(2m)" }, { "status": "affected", "version": "3.2(41d)" }, { "status": "affected", "version": "1.1(1o)" }, { "status": "affected", "version": "1.2(1m)" }, { "status": "affected", "version": "1.2(2j)" }, { "status": "affected", "version": "2.2(4r)" }, { "status": "affected", "version": "2.2(3j)" }, { "status": "affected", "version": "1.1(3f)" }, { "status": "affected", "version": "2.2(2f)" }, { "status": "affected", "version": "1.1(4m)" }, { "status": "affected", "version": "2.2(2k)" }, { "status": "affected", "version": "2.1(1i)" }, { "status": "affected", "version": "2.0(1p)" }, { "status": "affected", "version": "3.1(2p)" }, { "status": "affected", "version": "3.2(3s)" }, { "status": "affected", "version": "4.0(3c)" }, { "status": "affected", "version": "1.1(4e)" }, { "status": "affected", "version": "4.1(1k)" }, { "status": "affected", "version": "2.2(4f)" }, { "status": "affected", "version": "2.1(3h)" }, { "status": "affected", "version": "3.2(4d)" }, { "status": "affected", "version": "2.0(1n)" }, { "status": "affected", "version": "2.0(1m)" }, { "status": "affected", "version": "2.0(1r)" }, { "status": "affected", "version": "2.1(2e)" }, { "status": "affected", "version": "4.2(2e)" }, { "status": "affected", "version": "4.2(3j)" }, { "status": "affected", "version": "4.2(3n)" }, { "status": "affected", "version": "2.0(1l)" }, { "status": "affected", "version": "2.2(2e)" }, { "status": "affected", "version": "2.2(3r)" }, { "status": "affected", "version": "3.0(2k)" }, { "status": "affected", "version": "2.1(3g)" }, { "status": "affected", "version": "4.0(1h)" }, { "status": "affected", "version": "2.0(1o)" }, { "status": "affected", "version": "2.2(3p)" }, { "status": "affected", "version": "1.2(3e)" }, { "status": "affected", "version": "2.2(3s)" }, { "status": "affected", "version": "2.0(2g)" }, { "status": "affected", "version": "4.1(1l)" }, { "status": "affected", "version": "3.2(9f)" }, { "status": "affected", "version": "4.2(3l)" }, { "status": "affected", "version": "4.2(2g)" }, { "status": "affected", "version": "1.2(3c)" }, { "status": "affected", "version": "3.2(7k)" }, { "status": "affected", "version": "1.3(2h)" }, { "status": "affected", "version": "3.2(9b)" }, { "status": "affected", "version": "1.3(2k)" }, { "status": "affected", "version": "3.1(2t)" }, { "status": "affected", "version": "1.1(2h)" }, { "status": "affected", "version": "3.2(3j)" }, { "status": "affected", "version": "2.1(2k)" }, { "status": "affected", "version": "2.3(1f)" }, { "status": "affected", "version": "1.2(3h)" }, { "status": "affected", "version": "3.0(1i)" }, { "status": "affected", "version": "4.1(2u)" }, { "status": "affected", "version": "4.2(1l)" }, { "status": "affected", "version": "4.1(1a)" }, { "status": "affected", "version": "4.0(3d)" }, { "status": "affected", "version": "1.1(4l)" }, { "status": "affected", "version": "2.3(1i)" }, { "status": "affected", "version": "3.1(2q)" }, { "status": "affected", "version": "3.2(4e)" }, { "status": "affected", "version": "4.1(1i)" }, { "status": "affected", "version": "3.1(1i)" }, { "status": "affected", "version": "2.0(2m)" }, { "status": "affected", "version": "3.0(2h)" }, { "status": "affected", "version": "2.2(2q)" }, { "status": "affected", "version": "2.3(1l)" }, { "status": "affected", "version": "1.3(1h)" }, { "status": "affected", "version": "3.0(2n)" }, { "status": "affected", "version": "3.2(5f)" }, { "status": "affected", "version": "1.2(1h)" }, { "status": "affected", "version": "3.2(1l)" }, { "status": "affected", "version": "4.2(1i)" }, { "status": "affected", "version": "4.1(2o)" }, { "status": "affected", "version": "1.2(1i)" }, { "status": "affected", "version": "1.3(1j)" }, { "status": "affected", "version": "2.1(1h)" }, { "status": "affected", "version": "2.0(2l)" }, { "status": "affected", "version": "2.0(2h)" }, { "status": "affected", "version": "1.2(2g)" }, { "status": "affected", "version": "3.0(1k)" }, { "status": "affected", "version": "4.2(1g)" }, { "status": "affected", "version": "2.1(2g)" }, { "status": "affected", "version": "2.0(1q)" }, { "status": "affected", "version": "1.1(1j)" }, { "status": "affected", "version": "4.1(2g)" }, { "status": "affected", "version": "1.1(1r)" }, { "status": "affected", "version": "4.2(2f)" }, { "status": "affected", "version": "3.2(6i)" }, { "status": "affected", "version": "1.3(1g)" }, { "status": "affected", "version": "1.3(2j)" }, { "status": "affected", "version": "1.3(2i)" }, { "status": "affected", "version": "2.0(2o)" }, { "status": "affected", "version": "2.2(4q)" }, { "status": "affected", "version": "2.3(1o)" }, { "status": "affected", "version": "3.2(3i)" }, { "status": "affected", "version": "2.2(2j)" }, { "status": "affected", "version": "1.1(1d)" }, { "status": "affected", "version": "2.0(2n)" }, { "status": "affected", "version": "2.2(3t)" }, { "status": "affected", "version": "3.2(3n)" }, { "status": "affected", "version": "1.1(4g)" }, { "status": "affected", "version": "4.1(2x)" }, { "status": "affected", "version": "3.2(5d)" }, { "status": "affected", "version": "3.1(2o)" }, { "status": "affected", "version": "1.2(2i)" }, { "status": "affected", "version": "2.1(2f)" }, { "status": "affected", "version": "1.3(2f)" }, { "status": "affected", "version": "4.2(3q)" }, { "status": "affected", "version": "4.1(1j)" }, { "status": "affected", "version": "2.0(2f)" }, { "status": "affected", "version": "2.3(1e)" }, { "status": "affected", "version": "1.1(1s)" }, { "status": "affected", "version": "3.1(2v)" }, { "status": "affected", "version": "4.1(2w)" }, { "status": "affected", "version": "1.1(4i)" }, { "status": "affected", "version": "3.1(2u)" }, { "status": "affected", "version": "1.1(4f)" }, { "status": "affected", "version": "3.0(2m)" }, { "status": "affected", "version": "2.0(1k)" }, { "status": "affected", "version": "3.2(2o)" }, { "status": "affected", "version": "3.2(3r)" }, { "status": "affected", "version": "1.1(2i)" }, { "status": "affected", "version": "4.0(2c)" }, { "status": "affected", "version": "1.3(1i)" }, { "status": "affected", "version": "4.1(2s)" }, { "status": "affected", "version": "3.2(7f)" }, { "status": "affected", "version": "1.2(3m)" }, { "status": "affected", "version": "3.2(3o)" }, { "status": "affected", "version": "3.1(2s)" }, { "status": "affected", "version": "3.2(2l)" }, { "status": "affected", "version": "4.2(1j)" }, { "status": "affected", "version": "2.3(1p)" }, { "status": "affected", "version": "2.1(4a)" }, { "status": "affected", "version": "1.1(1n)" }, { "status": "affected", "version": "2.2(1n)" }, { "status": "affected", "version": "2.2(4p)" }, { "status": "affected", "version": "2.1(3j)" }, { "status": "affected", "version": "4.2(4i)" }, { "status": "affected", "version": "3.2(9h)" }, { "status": "affected", "version": "5.0(1k)" }, { "status": "affected", "version": "4.2(4k)" }, { "status": "affected", "version": "5.0(1l)" }, { "status": "affected", "version": "5.0(2e)" }, { "status": "affected", "version": "4.2(4o)" }, { "status": "affected", "version": "4.2(4p)" }, { "status": "affected", "version": "5.0(2h)" }, { "status": "affected", "version": "4.2(5k)" }, { "status": "affected", "version": "4.2(5l)" }, { "status": "affected", "version": "4.2(5n)" }, { "status": "affected", "version": "5.1(1h)" }, { "status": "affected", "version": "4.2(6d)" }, { "status": "affected", "version": "5.1(2e)" }, { "status": "affected", "version": "4.2(6g)" }, { "status": "affected", "version": "4.2(6h)" }, { "status": "affected", "version": "5.1(3e)" }, { "status": "affected", "version": "3.2(10e)" }, { "status": "affected", "version": "4.2(6l)" }, { "status": "affected", "version": "4.2(7f)" }, { "status": "affected", "version": "5.1(4c)" }, { "status": "affected", "version": "4.2(6o)" }, { "status": "affected", "version": "5.2(1g)" }, { "status": "affected", "version": "5.2(2e)" }, { "status": "affected", "version": "4.2(7l)" }, { "status": "affected", "version": "3.2(10f)" }, { "status": "affected", "version": "5.2(2f)" }, { "status": "affected", "version": "5.2(2g)" }, { "status": "affected", "version": "4.2(7q)" }, { "status": "affected", "version": "5.2(2h)" }, { "status": "affected", "version": "5.2(3f)" }, { "status": "affected", "version": "5.2(3e)" }, { "status": "affected", "version": "5.2(3g)" }, { "status": "affected", "version": "4.2(7r)" }, { "status": "affected", "version": "4.2(7s)" }, { "status": "affected", "version": "5.2(4d)" }, { "status": "affected", "version": "5.2(4e)" }, { "status": "affected", "version": "4.2(7t)" }, { "status": "affected", "version": "5.2(5d)" }, { "status": "affected", "version": "3.2(10g)" }, { "status": "affected", "version": "5.2(5c)" }, { "status": "affected", "version": "6.0(1g)" }, { "status": "affected", "version": "4.2(7u)" }, { "status": "affected", "version": "5.2(5e)" }, { "status": "affected", "version": "5.2(4f)" }, { "status": "affected", "version": "5.2(6e)" }, { "status": "affected", "version": "6.0(1j)" }, { "status": "affected", "version": "5.2(6g)" }, { "status": "affected", "version": "5.2(7f)" }, { "status": "affected", "version": "4.2(7v)" }, { "status": "affected", "version": "5.2(7g)" }, { "status": "affected", "version": "6.0(2h)" }, { "status": "affected", "version": "4.2(7w)" }, { "status": "affected", "version": "5.2(6h)" }, { "status": "affected", "version": "5.2(4h)" }, { "status": "affected", "version": "5.2(8d)" }, { "status": "affected", "version": "6.0(2j)" }, { "status": "affected", "version": "5.2(8e)" }, { "status": "affected", "version": "6.0(3d)" }, { "status": "affected", "version": "6.0(3e)" }, { "status": "affected", "version": "5.2(8f)" }, { "status": "affected", "version": "5.2(8g)" }, { "status": "affected", "version": "5.3(1d)" }, { "status": "affected", "version": "5.2(8h)" }, { "status": "affected", "version": "6.0(4c)" }, { "status": "affected", "version": "5.3(2a)" }, { "status": "affected", "version": "5.2(8i)" }, { "status": "affected", "version": "6.0(5h)" }, { "status": "affected", "version": "5.3(2b)" }, { "status": "affected", "version": "6.0(3g)" }, { "status": "affected", "version": "6.0(5j)" }, { "status": "affected", "version": "5.3(2c)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the software upgrade component of Cisco Application Policy Infrastructure Controller (APIC) and Cisco\u0026nbsp;Cloud Network Controller, formerly Cisco Cloud APIC, could allow an authenticated, remote attacker with Administrator-level privileges to install a modified software image, leading to arbitrary code injection on an affected system.\r\n\r\nThis vulnerability is due to insufficient signature validation of software images. An attacker could exploit this vulnerability by installing a modified software image. A successful exploit could allow the attacker to execute arbitrary code on the affected system and elevate their privileges to root.\r\nNote: Administrators should always validate the hash of any upgrade image before uploading it to Cisco APIC and Cisco Cloud Network Controller." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "Execution with Unnecessary Privileges", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-28T16:30:07.175Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-capic-priv-esc-uYQJjnuU", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-priv-esc-uYQJjnuU" } ], "source": { "advisory": "cisco-sa-capic-priv-esc-uYQJjnuU", "defects": [ "CSCwj32072" ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20478", "datePublished": "2024-08-28T16:30:07.175Z", "dateReserved": "2023-11-08T15:08:07.682Z", "dateUpdated": "2024-09-06T14:11:08.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1582
Vulnerability from cvelistv5
Published
2021-08-25 19:10
Modified
2024-11-07 22:02
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-scss-bFT75YrM | vendor-advisory, x_refsource_CISCO |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:18:10.312Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-scss-bFT75YrM" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1582", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:40:56.472969Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T22:02:50.469Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-08-25T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web UI of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow an authenticated, remote attacker to perform a stored cross-site scripting attack on an affected system. This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by sending malicious input to the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based interface or access sensitive, browser-based information." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-25T19:10:42", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-scss-bFT75YrM" } ], "source": { "advisory": "cisco-sa-capic-scss-bFT75YrM", "defect": [ [ "CSCvy64858" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-08-25T16:00:00", "ID": "CVE-2021-1582", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web UI of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow an authenticated, remote attacker to perform a stored cross-site scripting attack on an affected system. This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by sending malicious input to the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based interface or access sensitive, browser-based information." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.4", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "20210825 Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-scss-bFT75YrM" } ] }, "source": { "advisory": "cisco-sa-capic-scss-bFT75YrM", "defect": [ [ "CSCvy64858" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1582", "datePublished": "2021-08-25T19:10:42.777421Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-07T22:02:50.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20011
Vulnerability from cvelistv5
Published
2023-02-23 00:00
Modified
2024-10-28 16:34
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller Cross-Site Request Forgery Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:36.069Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230223 Cisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller Cross-Site Request Forgery Vulnerability", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-csrfv-DMx6KSwV" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20011", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-28T16:19:25.923684Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-28T16:34:01.189Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC) ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Network Controller, formerly Cisco Cloud APIC, could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the affected user has administrative privileges, these actions could include modifying the system configuration and creating new privileged accounts." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-23T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230223 Cisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller Cross-Site Request Forgery Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-csrfv-DMx6KSwV" } ], "source": { "advisory": "cisco-sa-capic-csrfv-DMx6KSwV", "defect": [ [ "CSCwd15559" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller Cross-Site Request Forgery Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20011", "datePublished": "2023-02-23T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-28T16:34:01.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1838
Vulnerability from cvelistv5
Published
2019-05-03 16:35
Modified
2024-11-21 19:32
Severity ?
EPSS score ?
Summary
Cisco Application Policy Infrastructure Controller Web-Based Management Interface Cross-Site Scripting Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-xss | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/108169 | vdb-entry, x_refsource_BID |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:42.852Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190501 Cisco Application Policy Infrastructure Controller Web-Based Management Interface Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-xss" }, { "name": "108169", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108169" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1838", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:58:48.955599Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:32:17.382Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Application Policy Infrastructure Controller (APIC)", "vendor": "Cisco", "versions": [ { "lessThan": "4.1(1i)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. This vulnerability has been fixed in software version 14.1(1i)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-07T13:06:06", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190501 Cisco Application Policy Infrastructure Controller Web-Based Management Interface Cross-Site Scripting Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-xss" }, { "name": "108169", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108169" } ], "source": { "advisory": "cisco-sa-20190501-apic-xss", "defect": [ [ "CSCvo76562" ] ], "discovery": "INTERNAL" }, "title": "Cisco Application Policy Infrastructure Controller Web-Based Management Interface Cross-Site Scripting Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-05-01T16:00:00-0700", "ID": "CVE-2019-1838", "STATE": "PUBLIC", "TITLE": "Cisco Application Policy Infrastructure Controller Web-Based Management Interface Cross-Site Scripting Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Application Policy Infrastructure Controller (APIC)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.1(1i)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the web-based management interface of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. This vulnerability has been fixed in software version 14.1(1i)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.4", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "20190501 Cisco Application Policy Infrastructure Controller Web-Based Management Interface Cross-Site Scripting Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-xss" }, { "name": "108169", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108169" } ] }, "source": { "advisory": "cisco-sa-20190501-apic-xss", "defect": [ [ "CSCvo76562" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1838", "datePublished": "2019-05-03T16:35:32.825299Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:32:17.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }