Privilege escalation in Cisco Application Policy Infrastructure Controller - CVE-2017-6768

 

Privilege escalation in Cisco Application Policy Infrastructure Controller - CVE-2017-6768

Published: August 17, 2017 / Updated: August 17, 2017


Vulnerability identifier: #VU7975
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/U:Clear
CVE-ID: CVE-2017-6768
CWE-ID: CWE-426
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Application Policy Infrastructure Controller

Detailed vulnerability description

The vulnerability allows a local authenticated attacker to gain elevated privileges on the target system.

The weakness exists in the build procedure for certain executable system files installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices due to untrusted search path. A local attacker can authenticate to the device, load a specially crafted library to gain root-level privileges and take full control of the device.

Successful exploitation of the vulnerability may result in system compromise.


How to mitigate CVE-2017-6768

Update to version 2.2(2e) or 2.3(1f).

Sources