A vulnerability in the Cisco IOS XE Software REST API could allow an authenticated, remote attacker to bypass API authorization checks and use the API to perform privileged actions on an affected device. The vulnerability is due to insufficient authorization checks for requests that are sent to the REST API of the affected software. An attacker could exploit this vulnerability by sending a malicious request to an affected device via the REST API. A successful exploit could allow the attacker to selectively bypass authorization checks for the REST API of the affected software and use the API to perform privileged actions on an affected device. Cisco Bug IDs: CSCuz56428.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103557 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-rest | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2018-03-28T22:00:00
Updated: 2018-03-31T09:57:01
Reserved: 2017-11-27T00:00:00
Link: CVE-2018-0195
JSON object: View
NVD Information
Status : Modified
Published: 2018-03-28T22:29:02.157
Modified: 2019-10-09T23:31:26.003
Link: CVE-2018-0195
JSON object: View
Redhat Information
No data.
CWE