You are here
Home > Preporuke > Ranjivost Cisco APIC uređaja

Ranjivost Cisco APIC uređaja

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Application Policy Infrastructure Controller Custom Binary Privilege Escalation Vulnerability

Advisory ID: cisco-sa-20170816-apic2

Revision: 1.0

For Public Release: 2017 August 16 16:00 GMT

Last Updated: 2017 August 16 16:00 GMT

CVE ID(s): CVE-2017-6768

CVSS Score v(3): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary
=======
A vulnerability in the build procedure for certain executable system files installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices could allow an authenticated, local attacker to gain root-level privileges.

The vulnerability is due to a custom executable system file that was built to use relative search paths for libraries without properly validating the library to be loaded. An attacker could exploit this vulnerability by authenticating to the device and loading a malicious library that can escalate the privilege level. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device. The attacker must have valid user credentials to log in to the device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-apic2 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-apic2”]

—–BEGIN PGP SIGNATURE—–
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=kR5A
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Ranjivost Cisco APIC kontrolera

Otkrivena je ranjivost unutar Cisco APIC (Application Policy Infrastructure Controller) kontrolera. Ranjivost je uzrokovana ograničenjima kojima RBAC (Role-Based Access Control)...

Close