First published: Sat Sep 24 2016(Updated: )
The installation procedure on Cisco Application Policy Infrastructure Controller (APIC) devices 1.3(2f) mishandles binary files, which allows local users to obtain root access via unspecified vectors, aka Bug ID CSCva50496.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Policy Infrastructure Controller (APIC) | =1.3\(2f\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6413 has a high severity rating, as it allows local users to obtain root access on affected Cisco APIC devices.
To fix CVE-2016-6413, you should upgrade your Cisco Application Policy Infrastructure Controller to a version higher than 1.3(2f) that addresses this vulnerability.
CVE-2016-6413 specifically affects Cisco Application Policy Infrastructure Controller version 1.3(2f).
The potential impacts of CVE-2016-6413 include unauthorized root access to the affected system, which could lead to a compromise of sensitive data and system integrity.
No official workarounds are recommended for CVE-2016-6413; the only mitigation is to update to a patched version.