First published: Wed Aug 15 2018(Updated: )
A vulnerability in the CronJob scheduler API of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to perform a command injection attack. The vulnerability is due to incorrect input validation of user-supplied data. An attacker could exploit this vulnerability by sending a malicious packet. A successful exploit could allow the attacker to execute arbitrary commands with root privileges. Cisco Bug IDs: CSCvi42263.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Policy Infrastructure Controller (APIC) | =dnac1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0427 is classified as a high-severity vulnerability.
To fix CVE-2018-0427, upgrade to the version of Cisco Application Policy Infrastructure Controller that addresses this vulnerability.
Yes, CVE-2018-0427 can be exploited by an authenticated, remote attacker.
CVE-2018-0427 is caused by incorrect input validation of user-supplied data in the CronJob scheduler API.
CVE-2018-0427 affects users of Cisco Digital Network Architecture (DNA) Center running version dnac1.1.