// For flags

CVE-2019-1889

Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in the REST API for software device management in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an authenticated, remote attacker to escalate privileges to root on an affected device. The vulnerability is due to incomplete validation and error checking for the file path when specific software is uploaded. An attacker could exploit this vulnerability by uploading malicious software using the REST API. A successful exploit could allow an attacker to escalate their privilege level to root. The attacker would need to have the administrator role on the device.

Un vulnerabilidad en la API REST para la administración de dispositivos de software en Cisco Application Policy Infrastructure Controller (APIC) Software podría permitir a un atacante remoto autenticado escalar los privilegios a root en un dispositivo afectado. La vulnerabilidad se debe a la validación incompleta y la comprobación de errores de la ruta del archivo cuando se carga un software específico. Un atacante podría aprovechar esta vulnerabilidad al cargar software malintencionado utilizando la API REST. Una explotación con éxito podría permitir a un atacante escalar su nivel de privilegio a root El atacante necesitaría tener el rol de administrador en el dispositivo.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-07-04 CVE Published
  • 2023-03-21 EPSS Updated
  • 2024-11-20 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Application Policy Infrastructure Controller
Search vendor "Cisco" for product "Application Policy Infrastructure Controller"
4.1\(1j\)
Search vendor "Cisco" for product "Application Policy Infrastructure Controller" and version "4.1\(1j\)"
-
Affected