var-201506-0313
Vulnerability from variot
Cisco Application Policy Infrastructure Controller (APIC) 1.0(1.110a) and 1.0(1e) on Nexus 9000 devices does not properly implement RBAC health scoring, which allows remote authenticated users to obtain sensitive information via unspecified vectors, aka Bug ID CSCuq77485. Vendors have confirmed this vulnerability Bug ID CSCuq77485 It is released as.Remotely authenticated users can obtain important information. All ACI information, optimizing application lifecycles, configuring applications across physical and virtual resources, and more. A security vulnerability exists in Cisco APIC 1.0 (1.110a) and 1.0 (1e) versions on Cisco Nexus 9000 devices due to the failure of the program to properly handle the RBAC protection mechanism of \342\200\230health scores\342\200\231. A remote attacker can exploit this vulnerability to obtain sensitive information. Attackers can exploit this issue to gain unauthorized access to the affected application. This may aid in further attacks. This issue is being tracked by Cisco bug ID CSCuq77485
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0313", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.0\\(1.110a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.0\\(1e\\)" }, { "model": "application policy infrastructure controller 1.0", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "nexus 93120tx switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 93128tx switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9332pq switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9336pq aci spini switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9372px switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9372tx switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9396px switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9396tx switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9504 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9508 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9516 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "1.0(1.110a)" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "1.0(1e)" }, { "model": "nexus devices", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9000" }, { "model": "nx-os software for nexus 1.0", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04150" }, { "db": "BID", "id": "75433" }, { "db": "JVNDB", "id": "JVNDB-2015-003291" }, { "db": "NVD", "id": "CVE-2015-4225" }, { "db": "CNNVD", "id": "CNNVD-201506-582" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:1.0\\(1.110a\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:1.0\\(1e\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-4225" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "75433" } ], "trust": 0.3 }, "cve": "CVE-2015-4225", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-4225", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CNVD-2015-04150", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-82186", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-4225", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-04150", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201506-582", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-82186", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04150" }, { "db": "VULHUB", "id": "VHN-82186" }, { "db": "JVNDB", "id": "JVNDB-2015-003291" }, { "db": "NVD", "id": "CVE-2015-4225" }, { "db": "CNNVD", "id": "CNNVD-201506-582" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Application Policy Infrastructure Controller (APIC) 1.0(1.110a) and 1.0(1e) on Nexus 9000 devices does not properly implement RBAC health scoring, which allows remote authenticated users to obtain sensitive information via unspecified vectors, aka Bug ID CSCuq77485. Vendors have confirmed this vulnerability Bug ID CSCuq77485 It is released as.Remotely authenticated users can obtain important information. All ACI information, optimizing application lifecycles, configuring applications across physical and virtual resources, and more. A security vulnerability exists in Cisco APIC 1.0 (1.110a) and 1.0 (1e) versions on Cisco Nexus 9000 devices due to the failure of the program to properly handle the RBAC protection mechanism of \\342\\200\\230health scores\\342\\200\\231. A remote attacker can exploit this vulnerability to obtain sensitive information. \nAttackers can exploit this issue to gain unauthorized access to the affected application. This may aid in further attacks. \nThis issue is being tracked by Cisco bug ID CSCuq77485", "sources": [ { "db": "NVD", "id": "CVE-2015-4225" }, { "db": "JVNDB", "id": "JVNDB-2015-003291" }, { "db": "CNVD", "id": "CNVD-2015-04150" }, { "db": "BID", "id": "75433" }, { "db": "VULHUB", "id": "VHN-82186" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-4225", "trust": 3.4 }, { "db": "BID", "id": "75433", "trust": 1.4 }, { "db": "SECTRACK", "id": "1032735", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-003291", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201506-582", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-04150", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-82186", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04150" }, { "db": "VULHUB", "id": "VHN-82186" }, { "db": "BID", "id": "75433" }, { "db": "JVNDB", "id": "JVNDB-2015-003291" }, { "db": "NVD", "id": "CVE-2015-4225" }, { "db": "CNNVD", "id": "CNNVD-201506-582" } ] }, "id": "VAR-201506-0313", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-04150" }, { "db": "VULHUB", "id": "VHN-82186" } ], "trust": 1.297479 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04150" } ] }, "last_update_date": "2023-12-18T14:01:50.342000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "39529", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39529" }, { "title": "Cisco Nexus 9000 Application Policy Infrastructure Controller is not authorized to access vulnerable patches", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/60202" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04150" }, { "db": "JVNDB", "id": "JVNDB-2015-003291" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-82186" }, { "db": "JVNDB", "id": "JVNDB-2015-003291" }, { "db": "NVD", "id": "CVE-2015-4225" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39529" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/75433" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032735" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4225" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4225" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04150" }, { "db": "VULHUB", "id": "VHN-82186" }, { "db": "BID", "id": "75433" }, { "db": "JVNDB", "id": "JVNDB-2015-003291" }, { "db": "NVD", "id": "CVE-2015-4225" }, { "db": "CNNVD", "id": "CNNVD-201506-582" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-04150" }, { "db": "VULHUB", "id": "VHN-82186" }, { "db": "BID", "id": "75433" }, { "db": "JVNDB", "id": "JVNDB-2015-003291" }, { "db": "NVD", "id": "CVE-2015-4225" }, { "db": "CNNVD", "id": "CNNVD-201506-582" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-07-01T00:00:00", "db": "CNVD", "id": "CNVD-2015-04150" }, { "date": "2015-06-27T00:00:00", "db": "VULHUB", "id": "VHN-82186" }, { "date": "2015-06-26T00:00:00", "db": "BID", "id": "75433" }, { "date": "2015-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003291" }, { "date": "2015-06-27T10:59:01.173000", "db": "NVD", "id": "CVE-2015-4225" }, { "date": "2015-06-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-582" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-07-01T00:00:00", "db": "CNVD", "id": "CNVD-2015-04150" }, { "date": "2016-12-29T00:00:00", "db": "VULHUB", "id": "VHN-82186" }, { "date": "2015-06-26T00:00:00", "db": "BID", "id": "75433" }, { "date": "2015-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003291" }, { "date": "2016-12-29T13:31:53.070000", "db": "NVD", "id": "CVE-2015-4225" }, { "date": "2015-07-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-582" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-582" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Nexus 9000 Run on device Application Policy Infrastructure Controller Vulnerability in which important information is obtained", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003291" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-582" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.