SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Cisco Application Policy Infrastructure Controller Vendors:   Cisco
Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) Input Validation Flaw in Grapevine Update Process Lets Remote Authenticated Users Execute Arbitrary Commands on the Target System
SecurityTracker Alert ID:  1036634
SecurityTracker URL:  http://securitytracker.com/id/1036634
CVE Reference:   CVE-2016-1365   (Links to External Site)
Date:  Aug 17 2016
Impact:   Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): APIC-EM 1.0
Description:   A vulnerability was reported in Cisco Application Policy Infrastructure Controller Enterprise Module. A remote authenticated user can execute arbitrary commands with root privileges on the target system.

A remote authenticated user can supply a specially crafted parameter value to trigger an input validation flaw in the Grapevine update process to execute arbitrary operating system commands on the target system. The commands will run with root privileges.

The vendor has assigned bug ID CSCux15507 to this vulnerability.

Impact:   A remote authenticated user can execute arbitrary operating system commands on the target system with root privileges.
Solution:   The vendor has issued a fix (1.1).

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-apic

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-apic (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC