Privilege escalation in Cisco Application Policy Infrastructure Controller - CVE-2017-6768
Published: August 17, 2017 / Updated: August 17, 2017
Vulnerability identifier: #VU7975
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/U:Clear
CVE-ID: CVE-2017-6768
CWE-ID: CWE-426
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Application Policy Infrastructure Controller
Cisco Application Policy Infrastructure Controller
Detailed vulnerability description
The vulnerability allows a local authenticated attacker to gain elevated privileges on the target system.
The weakness exists in the build procedure for certain executable system files installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices due to untrusted search path. A local attacker can authenticate to the device, load a specially crafted library to gain root-level privileges and take full control of the device.
The weakness exists in the build procedure for certain executable system files installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices due to untrusted search path. A local attacker can authenticate to the device, load a specially crafted library to gain root-level privileges and take full control of the device.
Successful exploitation of the vulnerability may result in system compromise.
How to mitigate CVE-2017-6768
Update to version 2.2(2e) or 2.3(1f).