First published: Wed Feb 24 2021(Updated: )
Multiple vulnerabilities in Cisco Application Services Engine could allow an unauthenticated, remote attacker to gain privileged access to host-level operations or to learn device-specific information, create diagnostic files, and make limited configuration changes. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Services Engine | >=1.1<1.1\(3e\) | |
Cisco Application Policy Infrastructure Controller | =1.1.3-c | |
Cisco Application Policy Infrastructure Controller | =1.1.3-d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1393 is a vulnerability in Cisco Application Services Engine that could allow an unauthenticated remote attacker to gain privileged access or obtain device-specific information.
CVE-2021-1393 has a severity rating of 9.8 (Critical).
The affected software for CVE-2021-1393 includes Cisco Application Services Engine and Cisco Application Policy Infrastructure Controller versions 1.1.3-c and 1.1.3-d.
An attacker can exploit CVE-2021-1393 by gaining privileged access to host-level operations or by learning device-specific information, creating diagnostic files, and making limited configuration changes.
More information about CVE-2021-1393 can be found at the following URL: [https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-case-mvuln-dYrDPC6w](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-case-mvuln-dYrDPC6w)