Cisco APIC Access Control Vulnerability (CVE-2015-4235)
Cisco APIC Access Control Vulnerability (CVE-2015-4235)
Release date:
Updated on:
Affected Systems:
Cisco Application Policy Infrastructure Controller < 1.1(1j)
Cisco Application Policy Infrastructure Controller < 1.0(4o)
Cisco Application Policy Infrastructure Controller < 1.0(3o)
Description:
CVE (CAN) ID: CVE-2015-4235
Cisco Application Policy Infrastructure Controller can provide centralized access services for all fabric information, optimize applications, and support Application configuration.
The cluster management configuration of Cisco APCI and Cisco Nexus 9000 Series ACI Mode Switch has a vulnerability. authenticated remote attackers can exploit this vulnerability to allow root users to access APCI. This vulnerability is caused by incorrect access control in the APIC file system.
<* Source: Cisco
Link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-apic
*>
Suggestion:
Vendor patch:
Cisco
-----
Cisco has released a Security Bulletin (cisco-sa-20150722-apic) and patches for this:
Cisco-sa-20150722-apic: Cisco Application Policy Infrastructure Controller Access Control Vulnerability
Link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150722-apic
Patch download: https://software.cisco.com/download/release.html? Mdfid = 285968390 & softwareid = 286278832 & release = 1.1% 281j % 29 & relind = AVAILABLE & rellifecycle = & reltype = latest & I = rm
This article permanently updates the link address: