First published: Wed Aug 25 2021(Updated: )
Multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow a remote attacker to perform a command injection or file upload attack on an affected system. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Policy Infrastructure Controller | <3.2\(10f\) | |
Cisco Application Policy Infrastructure Controller | >=4.0<4.2\(7l\) | |
Cisco Application Policy Infrastructure Controller | >=5.0<5.2\(1g\) | |
Cisco Cloud Application Policy Infrastructure Controller | <3.2\(10f\) | |
Cisco Cloud Application Policy Infrastructure Controller | >=4.0<4.2\(7l\) | |
Cisco Cloud Application Policy Infrastructure Controller | >=5.0<5.2\(1g\) |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1581 refers to multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC.
The severity of CVE-2021-1581 is critical, with a severity value of 9.1.
Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud APIC versions 3.2(10f) up to exclusive, 4.0 to exclusive, 4.2(7l) up to exclusive, 5.0 to exclusive, and 5.2(1g) up to exclusive are affected by CVE-2021-1581.
A remote attacker can exploit CVE-2021-1581 by performing a command injection or file upload attack on an affected system.
You can find more information about CVE-2021-1581 at the following link: [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-mdvul-HBsJBuvW)