First published: Wed Mar 06 2019(Updated: )
A vulnerability in the management interface of Cisco Application Policy Infrastructure Controller (APIC) software could allow an unauthenticated, adjacent attacker to gain unauthorized access on an affected device. The vulnerability is due to a lack of proper access control mechanisms for IPv6 link-local connectivity imposed on the management interface of an affected device. An attacker on the same physical network could exploit this vulnerability by attempting to connect to the IPv6 link-local address on the affected device. A successful exploit could allow the attacker to bypass default access control restrictions on an affected device. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-apic-ipv6
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Policy Infrastructure Controller (APIC) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability cisco-sa-20190306-apic-ipv6 is classified as a high severity due to unauthorized access risk.
To fix cisco-sa-20190306-apic-ipv6, apply the latest security updates from Cisco for the Application Policy Infrastructure Controller (APIC).
An attacker exploiting cisco-sa-20190306-apic-ipv6 can gain unauthorized access to the affected device, compromising its security.
Currently, there are no known workarounds for the cisco-sa-20190306-apic-ipv6 vulnerability.
The cisco-sa-20190306-apic-ipv6 vulnerability affects users of Cisco Application Policy Infrastructure Controller (APIC) software.