CVE-2016-1302
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
Cisco Application Policy Infrastructure Controller (APIC) devices with software before 1.0(3h) and 1.1 before 1.1(1j) and Nexus 9000 ACI Mode switches with software before 11.0(3h) and 11.1 before 11.1(1j) allow remote authenticated users to bypass intended RBAC restrictions via crafted REST requests, aka Bug ID CSCut12998.
Known Affected Software
4 configuration(s) from 4 vendor(s)
nx-os
Version:
base
CPE:
cpe:2.3:o:cisco:nx-os:base:*:*:*:*:*:*:*
x14j_firmware
Version:
t-ms14jakucb-1102.5
CPE:
cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*
opensolaris
Version:
snv_124
CPE:
cpe:2.3:o:sun:opensolaris:snv_124:*:*:*:*:*:*:*
keymouse_firmware
Version:
3.08
CPE:
cpe:2.3:o:zzinc:keymouse_firmware:3.08:*:*:*:*:windows:*:*
This vulnerability affects 4 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-apicpsirt@cisco.com Vendor Advisory
-
http://www.securitytracker.com/id/1034925psirt@cisco.com
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160203-apicaf854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
http://www.securitytracker.com/id/1034925af854a3a-2127-422b-91ae-364da2661108
Severity Details
out of 10.0
Low
Weakness Type (CWE)
CWE-284
Improper Access Control
- Description
- The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
- Typical Severity
- Medium
- Abstraction Level
- Pillar
Key Information
- Published Date
- February 07, 2016
