First published: Wed Aug 25 2021(Updated: )
A vulnerability in the web UI of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow an authenticated, remote attacker to perform a stored cross-site scripting attack on an affected system. This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by sending malicious input to the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based interface or access sensitive, browser-based information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Policy Infrastructure Controller | <3.2\(10f\) | |
Cisco Application Policy Infrastructure Controller | >=4.0<4.2\(7i\) | |
Cisco Application Policy Infrastructure Controller | >=5.0<5.2\(2f\) | |
Cisco Cloud Application Policy Infrastructure Controller | <3.2\(10f\) | |
Cisco Cloud Application Policy Infrastructure Controller | >=4.0<4.2\(7i\) | |
Cisco Cloud Application Policy Infrastructure Controller | >=5.0<5.2\(1h\) |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-scss-bFT75YrM
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1582.
The severity rating is medium with a CVSS score of 5.4.
The vulnerability affects Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud APIC.
The vulnerability allows an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack on an affected system.
It is recommended to apply the necessary updates or patches provided by Cisco.