CWE
320
Advisory Published

cisco-sa-20190501-apic-encrypt: Cisco Application Policy Infrastructure Controller Recoverable Encryption Key Vulnerability

First published: Wed May 01 2019(Updated: )

A vulnerability in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an unauthenticated, local attacker with physical access to obtain sensitive information from an affected device. The vulnerability is due to insecure removal of cleartext encryption keys stored on local partitions in the hard drive of an affected device. An attacker could exploit this vulnerability by retrieving data from the physical disk on the affected partition(s). A successful exploit could allow the attacker to retrieve encryption keys, possibly allowing the attacker to further decrypt other data and sensitive information on the device, which could lead to the disclosure of confidential information. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-encrypt

Credit: Costin Enache Detack GmbH

Affected SoftwareAffected VersionHow to fix
Cisco Application Policy Infrastructure Controller (APIC)

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of cisco-sa-20190501-apic-encrypt?

    The severity of cisco-sa-20190501-apic-encrypt is considered high due to the potential for an unauthenticated local attacker to gain access to sensitive information.

  • How do I fix cisco-sa-20190501-apic-encrypt?

    To fix cisco-sa-20190501-apic-encrypt, ensure you apply the latest updates and patches provided by Cisco for the Application Policy Infrastructure Controller.

  • Who is affected by cisco-sa-20190501-apic-encrypt?

    Cisco Application Policy Infrastructure Controller (APIC) users are affected by the cisco-sa-20190501-apic-encrypt vulnerability.

  • What causes the vulnerability cisco-sa-20190501-apic-encrypt?

    The cisco-sa-20190501-apic-encrypt vulnerability is caused by the insecure removal of cleartext encryption keys from the device.

  • Can cisco-sa-20190501-apic-encrypt be exploited remotely?

    No, cisco-sa-20190501-apic-encrypt requires physical access to the affected device for exploitation.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203