Privilege escalation in Cisco Application Policy Infrastructure Controller - CVE-2017-6767
Published: August 17, 2017 / Updated: July 20, 2018
Vulnerability identifier: #VU7976
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-6767
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Application Policy Infrastructure Controller
Cisco Application Policy Infrastructure Controller
Detailed vulnerability description
The vulnerability allows a remote authenticated attacker to gain elevated privileges on the target system.
The weakness exists in Cisco Application Policy Infrastructure Controller (APIC) due to a limitation with how Role-Based Access Control (RBAC) grants privileges to remotely authenticated users when login occurs via SSH directly to the local management interface of the APIC. A remote attacker can authenticate to the targeted device, gain elevated privileges and perform CLI commands.
The weakness exists in Cisco Application Policy Infrastructure Controller (APIC) due to a limitation with how Role-Based Access Control (RBAC) grants privileges to remotely authenticated users when login occurs via SSH directly to the local management interface of the APIC. A remote attacker can authenticate to the targeted device, gain elevated privileges and perform CLI commands.
Successful exploitation of the vulnerability results in privilege escalation.
How to mitigate CVE-2017-6767
Update to version 2.2(2e) or 2.3(1f).