First published: Sun Feb 07 2016(Updated: )
Cisco Application Policy Infrastructure Controller (APIC) devices with software before 1.0(3h) and 1.1 before 1.1(1j) and Nexus 9000 ACI Mode switches with software before 11.0(3h) and 11.1 before 11.1(1j) allow remote authenticated users to bypass intended RBAC restrictions via crafted REST requests, aka Bug ID CSCut12998.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung X14J eu | =t-ms14jakucb-1102.5 | |
Oracle Solaris and Zettabyte File System (ZFS) | =snv_124 | |
Zyxel GS1900-10HP firmware | <2.50\(aazi.0\)c0 | |
zzinc KeyMouse | =3.08 | |
Cisco Nexus 92160YC Switch | ||
Cisco Nexus 92304QC Firmware | ||
Cisco Nexus 9236C | ||
Cisco Nexus 9272Q Switch | ||
Cisco Nexus | ||
Cisco Nexus 93120TX Firmware | ||
Cisco Nexus 93128TX | ||
Cisco Nexus 93180YC-EX-24 | ||
Cisco Nexus 9332PQ Firmware | ||
Cisco Nexus N9336PQ-X | ||
Cisco Nexus 9372PX-E | ||
Cisco Nexus 9372TX Firmware | ||
Cisco Nexus 9396PX Firmware | ||
Cisco Nexus 9396TX Firmware | ||
Cisco Nexus 9504 Firmware | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 firmware | ||
Cisco NX-OS | =base |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1302 is rated as a high severity vulnerability which allows remote authenticated users to bypass intended RBAC restrictions.
To fix CVE-2016-1302, update the software on Cisco Application Policy Infrastructure Controller (APIC) devices to version 1.0(3h) or 1.1(1j) and Nexus 9000 ACI Mode switches to 11.0(3h) or 11.1(1j).
CVE-2016-1302 affects Cisco Application Policy Infrastructure Controller devices and Nexus 9000 ACI Mode switches with specific software versions prior to the updates.
Yes, CVE-2016-1302 can be exploited by remote authenticated users through specially crafted REST requests.
There are no specific workarounds documented for CVE-2016-1302; it is recommended to apply the necessary software updates.