First published: Wed Aug 23 2023(Updated: )
A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to read, modify, or delete non-tenant policies (for example, access policies) created by users associated with a different
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Policy Infrastructure Controller (APIC) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-apic-uapa-F4TAShk is classified as high due to its potential impact on non-tenant policies.
To fix cisco-sa-apic-uapa-F4TAShk, it is recommended to apply the latest patches provided by Cisco for the Application Policy Infrastructure Controller.
Anyone using the Cisco Application Policy Infrastructure Controller with certain configurations may be affected by cisco-sa-apic-uapa-F4TAShk.
cisco-sa-apic-uapa-F4TAShk can facilitate attacks that allow an authenticated remote attacker to read, modify, or delete non-tenant policies.
The main vulnerability of cisco-sa-apic-uapa-F4TAShk is the restricted security domain implementation that compromises non-tenant policy management.