Page 4 of 46 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

16 Jul 2018 — A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an authenticated, local attacker to access sensitive information on an affected system. The vulnerability is due to insufficient security restrictions imposed by the affected software. An attacker could exploit this vulnerability by accessing unprotected log files. A successful exploit could allow the attacker to access sensitive log files, which may include system credentials, on the affected device. Cisco Bug IDs: CSCvi22400. • http://www.securityfocus.com/bid/104729 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

30 Nov 2017 — A vulnerability in certain system script files that are installed at boot time on Cisco Application Policy Infrastructure Controllers could allow an authenticated, local attacker to gain elevated privileges and execute arbitrary commands with root privileges on an affected host operating system. The vulnerability is due to insufficient validation of user-controlled input that is supplied to certain script files of an affected system. An attacker could exploit this vulnerability by submitting crafted input t... • http://www.securityfocus.com/bid/101993 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

02 Nov 2017 — A vulnerability within the firewall configuration of the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) could allow an unauthenticated, adjacent attacker to gain privileged access to services only available on the internal network of the device. The vulnerability is due to an incorrect firewall rule on the device. The misconfiguration could allow traffic sent to the public interface of the device to be forwarded to the internal virtual network of the APIC-EM. An attacker that... • http://www.securityfocus.com/bid/101647 • CWE-284: Improper Access Control CWE-665: Improper Initialization •

CVSS: 7.1EPSS: 0%CPEs: 24EXPL: 0

17 Aug 2017 — A vulnerability in Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to gain higher privileges than the account is assigned. The attacker will be granted the privileges of the last user to log in, regardless of whether those privileges are higher or lower than what should have been granted. The attacker cannot gain root-level privileges. The vulnerability is due to a limitation with how Role-Based Access Control (RBAC) grants privileges to remotely authe... • http://www.securityfocus.com/bid/100400 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

17 Aug 2017 — A vulnerability in the build procedure for certain executable system files installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices could allow an authenticated, local attacker to gain root-level privileges. The vulnerability is due to a custom executable system file that was built to use relative search paths for libraries without properly validating the library to be loaded. An attacker could exploit this vulnerability by authenticating to the device and loading a malici... • http://www.securityfocus.com/bid/100363 • CWE-426: Untrusted Search Path •

CVSS: 6.5EPSS: 0%CPEs: 37EXPL: 0

19 Nov 2016 — A vulnerability in the Cisco Nexus 9000 Series Platform Leaf Switches for Application Centric Infrastructure (ACI) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability affects Cisco Nexus 9000 Series Leaf Switches (TOR) - ACI Mode and Cisco Application Policy Infrastructure Controller (APIC). More Information: CSCuy93241. Known Affected Releases: 11.2(2x) 11.2(3x) 11.3(1x) 11.3(2x) 12.0(1x). Known Fixed Releases: 11.2(2i) 1... • http://www.securityfocus.com/bid/94077 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

24 Sep 2016 — The installation procedure on Cisco Application Policy Infrastructure Controller (APIC) devices 1.3(2f) mishandles binary files, which allows local users to obtain root access via unspecified vectors, aka Bug ID CSCva50496. El procedimiento de instalación en dispositivos 1.3(2f) Cisco Application Policy Infrastructure Controller (APIC) maneja incorrectamente archivos binarios, lo que permite a usuarios locales obtener acceso de root a través de vectores no especificados, vulnerabilidad también conocida como... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-apic • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 0

18 Aug 2016 — The Grapevine update process in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.0 allows remote authenticated users to execute arbitrary commands as root via a crafted upgrade parameter, aka Bug ID CSCux15507. El proceso de actualización Grapevine en Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.0 permite a usuarios remotos autenticados ejecutar comandos arbitrarios como root a través de un parámetro de actualización manipulado también cono... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-apic • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 16EXPL: 0

10 Jun 2016 — The installation component on Cisco Application Policy Infrastructure Controller (APIC) devices with software before 1.3(2f) mishandles binary files, which allows local users to obtain root access via unspecified vectors, aka Bug ID CSCuz72347. El componente de instalación en dispositivos Cisco Application Policy Infrastructure Controller (APIC) con software en versiones anteriores a 1.3(2f) no maneja correctamente archivos binarios, lo que permite a usuarios locales obtener acceso root a través de vectores... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160609-apic •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

28 Apr 2016 — The API in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.0(1) allows remote attackers to spoof administrative notifications via crafted attribute-value pairs, aka Bug ID CSCux15521. La API en Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.0(1) permite a atacantes remotos suplantar notificaciones administrativas a través de pares de valor-atributo manipulados, también conocida como Bug ID CSCux15521. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-apic • CWE-264: Permissions, Privileges, and Access Controls •