Insufficient Role-Based Access Control in Cisco APIC and Cloud APIC Allows Privilege Escalation

Insufficient Role-Based Access Control in Cisco APIC and Cloud APIC Allows Privilege Escalation

CVE-2021-1579 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.

Learn more about our Cis Benchmark Audit For Cisco.