// For flags

CVE-2021-1578

Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker to elevate privileges to Administrator on an affected device. This vulnerability is due to an improper policy default setting. An attacker could exploit this vulnerability by using a non-privileged credential for Cisco ACI Multi-Site Orchestrator (MSO) to send a specific API request to a managed Cisco APIC or Cloud APIC device. A successful exploit could allow the attacker to obtain Administrator credentials on the affected device.

Una vulnerabilidad en un endpoint de la API de Cisco Application Policy Infrastructure Controller (APIC) y Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) podría permitir a un atacante remoto autenticado elevar los privilegios a Administrador en un dispositivo afectado. Esta vulnerabilidad es debido a una configuración inapropiada de la política predeterminada. Un atacante podría explotar esta vulnerabilidad al usar una credencial sin privilegios para Cisco ACI Multi-Site Orchestrator (MSO) para enviar una petición de API específica a un dispositivo manejado por Cisco APIC o Cloud APIC. Una explotación con éxito podría permitir al atacante obtener credenciales de Administrador en el dispositivo afectado.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-11-13 CVE Reserved
  • 2021-08-25 CVE Published
  • 2023-11-17 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-636: Not Failing Securely ('Failing Open')
  • CWE-755: Improper Handling of Exceptional Conditions
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Application Policy Infrastructure Controller
Search vendor "Cisco" for product "Application Policy Infrastructure Controller"
>= 5.0 <= 5.1\(3e\)
Search vendor "Cisco" for product "Application Policy Infrastructure Controller" and version " >= 5.0 <= 5.1\(3e\)"
-
Affected
Cisco
Search vendor "Cisco"
Application Policy Infrastructure Controller
Search vendor "Cisco" for product "Application Policy Infrastructure Controller"
5.0\(2h\)
Search vendor "Cisco" for product "Application Policy Infrastructure Controller" and version "5.0\(2h\)"
-
Affected
Cisco
Search vendor "Cisco"
Cloud Application Policy Infrastructure Controller
Search vendor "Cisco" for product "Cloud Application Policy Infrastructure Controller"
>= 5.0 <= 5.1\(3e\)
Search vendor "Cisco" for product "Cloud Application Policy Infrastructure Controller" and version " >= 5.0 <= 5.1\(3e\)"
-
Affected
Cisco
Search vendor "Cisco"
Cloud Application Policy Infrastructure Controller
Search vendor "Cisco" for product "Cloud Application Policy Infrastructure Controller"
5.0\(2h\)
Search vendor "Cisco" for product "Cloud Application Policy Infrastructure Controller" and version "5.0\(2h\)"
-
Affected