Privilege Escalation in Cisco Application Policy Infrastructure Controller
CVE-2017-6767
Key Information:
- Vendor
- Cisco
- Vendor
- CVE Published:
- 16 August 2017
Summary
A vulnerability in the Cisco Application Policy Infrastructure Controller (APIC) allows an authenticated remote attacker to elevate their privileges beyond what is typically assigned. This occurs due to a flaw in how Role-Based Access Control manages permissions during SSH logins. When an attacker gains access to the device, their privilege level can be set to match that of the last user logged in, enabling them to execute CLI commands that should be restricted based on their original role. While this exploitation does not grant root-level access, it presents significant risks of unauthorized actions within network environments.
Affected Version(s)
Application Policy Infrastructure Controller (APIC) 1.0(1e), 1.0(1h), 1.0(1k), 1.0(1n), 1.0(2j), 1.0(2m), 1.0(3f), 1.0(3i), 1.0(3k), 1.0(3n), 1.0(4h), 1.0(4o)
Application Policy Infrastructure Controller (APIC) 1.1(0.920a), 1.1(1j), 1.1(3f)
Application Policy Infrastructure Controller (APIC) 1.2 Base, 1.2(2), 1.2(3), 1.2.2
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved