A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.
History

Thu, 07 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2021-08-25T19:10:26.575278Z

Updated: 2024-11-07T22:03:10.302Z

Reserved: 2020-11-13T00:00:00

Link: CVE-2021-1579

cve-icon Vulnrichment

Updated: 2024-08-03T16:18:10.265Z

cve-icon NVD

Status : Modified

Published: 2021-08-25T20:15:10.303

Modified: 2024-11-21T05:44:39.990

Link: CVE-2021-1579

cve-icon Redhat

No data.