First published: Wed Aug 28 2024(Updated: )
A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to modify the behavior of default system policies, such as quality of service (QoS) policies, on an affected
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Policy Infrastructure Controller (APIC) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-apic-cousmo-uBpBYGbq is classified as high, which indicates a significant risk to affected systems.
To fix cisco-sa-apic-cousmo-uBpBYGbq, apply the latest patches or workarounds provided by Cisco in their security advisory.
Cisco Application Policy Infrastructure Controller (APIC) users are primarily affected by cisco-sa-apic-cousmo-uBpBYGbq.
An authenticated remote attacker can exploit cisco-sa-apic-cousmo-uBpBYGbq to modify default system policies.
The potential impacts of cisco-sa-apic-cousmo-uBpBYGbq include unauthorized changes to quality of service (QoS) policies and other default system behaviors.