SB2017081705 - Privilege escalation in Cisco Application Policy Infrastructure Controller



SB2017081705 - Privilege escalation in Cisco Application Policy Infrastructure Controller

Published: August 17, 2017

Security Bulletin ID SB2017081705
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Privilege escalation (CVE-ID: CVE-2017-6768)

The vulnerability allows a local authenticated attacker to gain elevated privileges on the target system.

The weakness exists in the build procedure for certain executable system files installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices due to untrusted search path. A local attacker can authenticate to the device, load a specially crafted library to gain root-level privileges and take full control of the device.

Successful exploitation of the vulnerability may result in system compromise.


2) Privilege escalation (CVE-ID: CVE-2017-6767)

The vulnerability allows a remote authenticated attacker to gain elevated privileges on the target system.

The weakness exists in Cisco Application Policy Infrastructure Controller (APIC) due to a limitation with how Role-Based Access Control (RBAC) grants privileges to remotely authenticated users when login occurs via SSH directly to the local management interface of the APIC. A remote attacker can authenticate to the targeted device, gain elevated privileges and perform CLI commands.

Successful exploitation of the vulnerability results in privilege escalation.


Remediation

Install update from vendor's website.