First published: Thu Jan 18 2018(Updated: )
A vulnerability in the role-based access control (RBAC) functionality of Cisco Prime Infrastructure could allow an authenticated, remote attacker to perform a privilege escalation in which one virtual domain user can view and modify another virtual domain configuration. The vulnerability is due to a failure to properly enforce RBAC for virtual domains. An attacker could exploit this vulnerability by sending an authenticated, crafted HTTP request to a targeted application. An exploit could allow the attacker to bypass RBAC policies on the targeted system to modify a virtual domain and access resources that are not normally accessible. Cisco Bug IDs: CSCvg36875.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Infrastructure | =3.2\(0.0\) | |
Cisco Prime Infrastructure | =3.3\(0.0\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-0096.
The severity rating for CVE-2018-0096 is medium with a score of 5.9.
The affected software for CVE-2018-0096 is Cisco Prime Infrastructure versions 3.2(0.0) and 3.3(0.0).
CVE-2018-0096 is a vulnerability in the role-based access control (RBAC) functionality of Cisco Prime Infrastructure that allows an authenticated, remote attacker to perform privilege escalation.
To fix CVE-2018-0096, Cisco recommends upgrading to a fixed software release.