Privilege Escalation in Cisco Application Policy Infrastructure Controller
CVE-2017-6767
Key Information:
- Vendor
Cisco
- Vendor
- CVE Published:
- 16 August 2017
What is CVE-2017-6767?
A vulnerability in the Cisco Application Policy Infrastructure Controller (APIC) allows an authenticated remote attacker to elevate their privileges beyond what is typically assigned. This occurs due to a flaw in how Role-Based Access Control manages permissions during SSH logins. When an attacker gains access to the device, their privilege level can be set to match that of the last user logged in, enabling them to execute CLI commands that should be restricted based on their original role. While this exploitation does not grant root-level access, it presents significant risks of unauthorized actions within network environments.
Affected Version(s)
Application Policy Infrastructure Controller (APIC) 1.0(1e), 1.0(1h), 1.0(1k), 1.0(1n), 1.0(2j), 1.0(2m), 1.0(3f), 1.0(3i), 1.0(3k), 1.0(3n), 1.0(4h), 1.0(4o)
Application Policy Infrastructure Controller (APIC) 1.1(0.920a), 1.1(1j), 1.1(3f)
Application Policy Infrastructure Controller (APIC) 1.2 Base, 1.2(2), 1.2(3), 1.2.2