First published: Fri Jul 24 2015(Updated: )
Cisco Application Policy Infrastructure Controller (APIC) devices with software before 1.0(3o) and 1.1 before 1.1(1j) and Nexus 9000 ACI devices with software before 11.0(4o) and 11.1 before 11.1(1j) do not properly restrict access to the APIC filesystem, which allows remote authenticated users to obtain root privileges via unspecified use of the APIC cluster-management configuration feature, aka Bug IDs CSCuu72094 and CSCuv11991.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Policy Infrastructure Controller (APIC) | =1.0\(1e\) | |
Cisco NX-OS | =11.0\(1b\) | |
Cisco NX-OS | =11.0\(1c\) | |
Cisco NX-OS | =11.0\(1d\) | |
Cisco NX-OS | =11.0\(1e\) | |
Cisco NX-OS | =11.0\(2j\) | |
Cisco NX-OS | =11.0\(2m\) | |
Cisco NX-OS | =11.0\(3f\) | |
Cisco NX-OS | =11.0\(3i\) | |
Cisco NX-OS | =11.0\(3k\) | |
Cisco NX-OS | =11.0\(3n\) | |
Cisco NX-OS | =11.0\(4h\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4235 has been classified as a high severity vulnerability.
To address CVE-2015-4235, upgrade to Cisco Application Policy Infrastructure Controller (APIC) software version 1.0(3o) or later, and Nexus 9000 ACI devices running version 11.0(4o) or later.
CVE-2015-4235 is a filesystem access control vulnerability allowing remote authenticated users to access unauthorized files.
CVE-2015-4235 affects Cisco Application Policy Infrastructure Controller (APIC) and Nexus 9000 ACI devices with specified software versions.
No, CVE-2015-4235 requires remote authenticated access to exploit the filesystem access issue.