First published: Wed Feb 24 2021(Updated: )
Multiple vulnerabilities in Cisco Application Services Engine could allow an unauthenticated, remote attacker to gain privileged access to host-level operations or to learn device-specific information, create diagnostic files, and make limited configuration changes. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Services Engine | >=1.1<1.1\(3e\) | |
Cisco Application Policy Infrastructure Controller | =1.1.3-c | |
Cisco Application Policy Infrastructure Controller | =1.1.3-d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1396 is a vulnerability in Cisco Application Services Engine that could allow an unauthenticated remote attacker to gain privileged access to host-level operations or to learn device-specific information.
CVE-2021-1396 has a severity score of 6.5, which is considered critical.
The Cisco Application Services Engine versions 1.1 up to and including 1.1(3e) and Cisco Application Policy Infrastructure Controller version 1.1.3-c and 1.1.3-d are affected by CVE-2021-1396.
An unauthenticated remote attacker can exploit CVE-2021-1396 to gain privileged access to host-level operations or to learn device-specific information, create diagnostic files, and make limited configuration changes.
You can find more information about CVE-2021-1396 in the Cisco Security Advisory: [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-case-mvuln-dYrDPC6w).