A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-chvul-CKfGYBh8 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2021-08-25T00:00:00
Updated: 2021-08-25T19:10:26
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1579
JSON object: View
NVD Information
Status : Modified
Published: 2021-08-25T20:15:10.303
Modified: 2023-11-07T03:28:41.010
Link: CVE-2021-1579
JSON object: View
Redhat Information
No data.