First published: Sat Jun 27 2015(Updated: )
Cisco Application Policy Infrastructure Controller (APIC) 1.0(1.110a) and 1.0(1e) on Nexus 9000 devices does not properly implement RBAC health scoring, which allows remote authenticated users to obtain sensitive information via unspecified vectors, aka Bug ID CSCuq77485.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =1.0\(1.110a\) | |
Cisco NX-OS | =1.0\(1e\) | |
Cisco Nexus 93120TX Firmware | ||
Cisco Nexus 93128 Firmware | ||
Cisco Nexus 9332PQ Firmware | ||
Cisco Nexus N9336PQ-X | ||
Cisco Nexus 9372PX-E | ||
Cisco Nexus 9372TX | ||
Cisco Nexus 9396PX Firmware | ||
Cisco Nexus 9396TX Firmware | ||
Cisco Nexus 9504 firmware | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4225 has a medium severity rating due to its potential for allowing remote authenticated users to access sensitive information.
To fix CVE-2015-4225, you should upgrade to a secure version of Cisco Application Policy Infrastructure Controller that is not vulnerable to this issue.
CVE-2015-4225 affects Cisco NX-OS versions 1.0(1.110a) and 1.0(1e).
CVE-2015-4225 can be exploited by remote authenticated users with access to the affected device.
CVE-2015-4225 is a vulnerability related to improper implementation of role-based access control (RBAC) health scoring.