CVE-2015-4235

Severity

90%

Complexity

80%

Confidentiality

165%

Cisco Application Policy Infrastructure Controller (APIC) devices with software before 1.0(3o) and 1.1 before 1.1(1j) and Nexus 9000 ACI devices with software before 11.0(4o) and 11.1 before 11.1(1j) do not properly restrict access to the APIC filesystem, which allows remote authenticated users to obtain root privileges via unspecified use of the APIC cluster-management configuration feature, aka Bug IDs CSCuu72094 and CSCuv11991.

Cisco Application Policy Infrastructure Controller (APIC) devices with software before 1.0(3o) and 1.1 before 1.1(1j) and Nexus 9000 ACI devices with software before 11.0(4o) and 11.1 before 11.1(1j) do not properly restrict access to the APIC filesystem, which allows remote authenticated users to obtain root privileges via unspecified use of the APIC cluster-management configuration feature, aka Bug IDs CSCuu72094 and CSCuv11991.

CVSS 2.0 Base Score 9. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C).

Overview

Type

Cisco NX-OS

First reported 9 years ago

2015-07-24 14:59:00

Last updated 7 years ago

2017-09-21 01:29:00

Affected Software

Cisco NX-OS 11.0(1B)

11.0\(1b\)

Cisco NX-OS 11.0(1c)

11.0\(1c\)

Cisco NX-OS 11.0(1d)

11.0\(1d\)

Cisco NX-OS 11.0(1e)

11.0\(1e\)

Cisco NX-OS 11.0(2j)

11.0\(2j\)

Cisco NX-OS 11.0(2m)

11.0\(2m\)

Cisco NX-OS 11.0(3f)

11.0\(3f\)

Cisco NX-OS 11.0(3i)

11.0\(3i\)

Cisco NX-OS 11.0(3k)

11.0\(3k\)

Cisco NX-OS 11.0(3n)

11.0\(3n\)

Cisco NX-OS 11.0(4h)

11.0\(4h\)

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.