SB2017081705 - Privilege escalation in Cisco Application Policy Infrastructure Controller
Published: August 17, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Privilege escalation (CVE-ID: CVE-2017-6768)
The vulnerability allows a local authenticated attacker to gain elevated privileges on the target system.The weakness exists in the build procedure for certain executable system files installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices due to untrusted search path. A local attacker can authenticate to the device, load a specially crafted library to gain root-level privileges and take full control of the device.
Successful exploitation of the vulnerability may result in system compromise.
2) Privilege escalation (CVE-ID: CVE-2017-6767)
The vulnerability allows a remote authenticated attacker to gain elevated privileges on the target system.The weakness exists in Cisco Application Policy Infrastructure Controller (APIC) due to a limitation with how Role-Based Access Control (RBAC) grants privileges to remotely authenticated users when login occurs via SSH directly to the local management interface of the APIC. A remote attacker can authenticate to the targeted device, gain elevated privileges and perform CLI commands.
Successful exploitation of the vulnerability results in privilege escalation.
Remediation
Install update from vendor's website.