Cisco APIC < 1.3(2f) Binary File Installation Handling Local Privilege Escalation

high Nessus Plugin ID 91730

Synopsis

A network management system running on the remote host is affected by a local privilege escalation vulnerability.

Description

According to its self-reported version number, the Cisco Application Policy Infrastructure Controller (APIC) software running on the remote host is prior to 1.3(2f). It is, therefore, affected by a local privilege escalation vulnerability due to insecure permissions set for binary files during the installation process. A local attacker can exploit this to gain root-level privileges.

Solution

Upgrade to Cisco APIC version 1.3(2f) or later.

See Also

http://www.nessus.org/u?4f00f4f2

Plugin Details

Severity: High

ID: 91730

File Name: cisco-sa-20160609-apic.nasl

Version: 1.4

Type: remote

Family: CISCO

Published: 6/21/2016

Updated: 11/19/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2016-1420

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:application_policy_infrastructure_controller, cpe:/o:cisco:application_policy_infrastructure_controller_firmware

Required KB Items: installed_sw/Cisco APIC Software

Exploit Ease: No known exploits are available

Patch Publication Date: 6/9/2016

Vulnerability Publication Date: 6/9/2016

Reference Information

CVE: CVE-2016-1420

CISCO-SA: cisco-sa-20160609-apic

CISCO-BUG-ID: CSCuz72347