CVE-2015-4235
Published Jul 24, 2015
Last updated 7 years ago
Overview
- Description
- Cisco Application Policy Infrastructure Controller (APIC) devices with software before 1.0(3o) and 1.1 before 1.1(1j) and Nexus 9000 ACI devices with software before 11.0(4o) and 11.1 before 11.1(1j) do not properly restrict access to the APIC filesystem, which allows remote authenticated users to obtain root privileges via unspecified use of the APIC cluster-management configuration feature, aka Bug IDs CSCuu72094 and CSCuv11991.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_\\(apic\\):1.0\\(1e\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59595A27-AAA7-4659-BAE7-8A0FE8613CB5" }, { "criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(1b\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C64CC640-B37D-4064-8946-B8CCCDE1A6EF" }, { "criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(1c\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8983275-20C6-487E-A265-3836F06AB226" }, { "criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(1d\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBCA0A4F-D475-405C-B9A7-EBB0A816B9C5" }, { "criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(1e\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA0E0039-23E1-425B-8B2C-DFE2C185CC8B" }, { "criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(2j\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C3FB2AC-934D-4F12-9E9B-EA5F0731DA4D" }, { "criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(2m\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BACE91F5-EC9B-4486-80F1-CFC3DA570B9B" }, { "criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(3f\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C60E5B9-10AB-4A69-B28D-0D526756E6B6" }, { "criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(3i\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "979FEE23-2C28-4212-9DA5-10A0EAFE1668" }, { "criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(3k\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B610400-181F-4621-B27B-18C2609990DB" }, { "criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(3n\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4585B70C-E162-42FA-9CB8-42C1F34017AB" }, { "criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(4h\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "788E6471-F000-45A7-9829-71F7AE5ED1B7" } ], "operator": "OR" } ] } ]