First published: Wed Apr 06 2016(Updated: )
The web API in Cisco Prime Infrastructure 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager (EPNM) 1.2 allows remote authenticated users to bypass intended RBAC restrictions and gain privileges via an HTTP request that is inconsistent with a pattern filter, aka Bug ID CSCuy10227.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Evolved Programmable Network Manager | =1.2.0 | |
Cisco Prime Infrastructure | =1.2 | |
Cisco Prime Infrastructure | =1.2.0.103 | |
Cisco Prime Infrastructure | =1.2.1 | |
Cisco Prime Infrastructure | =1.3 | |
Cisco Prime Infrastructure | =1.3.0.20 | |
Cisco Prime Infrastructure | =1.4 | |
Cisco Prime Infrastructure | =1.4.0.45 | |
Cisco Prime Infrastructure | =1.4.1 | |
Cisco Prime Infrastructure | =1.4.2 | |
Cisco Prime Infrastructure | =2.0 | |
Cisco Prime Infrastructure | =2.1.0 | |
Cisco Prime Infrastructure | =2.2 | |
Solaris | =snv_124 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1290 has a medium severity rating due to its potential to allow privilege escalation for remote authenticated users.
To fix CVE-2016-1290, upgrade your Cisco Prime Infrastructure or Cisco Evolved Programmable Network Manager to a version that includes the necessary security patches.
CVE-2016-1290 affects remote authenticated users of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager versions up to 2.2(2).
CVE-2016-1290 allows users to bypass role-based access control (RBAC) restrictions, potentially gaining unauthorized access to sensitive operations.
Organizations should evaluate their use of affected Cisco products and implement the recommended upgrades to mitigate the risks associated with CVE-2016-1290.