CVE-2016-1420
Published Jun 10, 2016
Last updated 8 years ago
Overview
- Description
- The installation component on Cisco Application Policy Infrastructure Controller (APIC) devices with software before 1.3(2f) mishandles binary files, which allows local users to obtain root access via unspecified vectors, aka Bug ID CSCuz72347.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:application_infrastructure_controller:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E660D79C-0273-48AB-A8D9-CE9E5B29E9D8" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.0\\(1e\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "139B6124-85F6-42E8-971A-DB856EF5AAC8" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.0\\(1h\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA151405-52B1-4083-93B2-3F5226103DF5" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.0\\(1k\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F35AC2E8-3A51-4EC8-AE12-DC5487DEE407" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.0\\(1n\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01DAF940-D3C7-4D17-8C82-C21186825FBE" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.0\\(2j\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D63750F-DD3C-4A17-88FB-E4D3E2DB4605" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.0\\(2m\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "897EBF17-1CFB-4987-9924-212286BC2C65" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.0\\(3f\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5003326-DB6A-4E26-AE5E-8330BFED8BFA" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.0\\(3i\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E955E14-4343-41CC-BF40-4C72509CA960" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.0\\(3k\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3750DA86-C98F-4893-8E55-A1315FD9A58A" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.0\\(3n\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "540F030A-51DB-4406-A96A-0D355ECA38BD" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.0\\(4h\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82636FE9-5B70-43DB-B6DE-1CAB249D3F3C" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.0\\(4o\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC741864-308B-4F54-9D48-84125DA0EEB3" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.1\\(0.920a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DFCFD66-3A42-46A3-B8F4-BBEE722092BA" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.1\\(1j\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0860BE70-2F40-42BF-90E7-BE8D80C207AE" }, { "criteria": "cpe:2.3:o:cisco:application_policy_infrastructure_controller_firmware:1.1\\(3f\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03DD4841-B371-48E3-BD1F-67A60644E6B1" } ], "operator": "OR" } ], "operator": "AND" } ]