First published: Wed Feb 22 2023(Updated: )
A vulnerability in the web-based management interface of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Network Controller, formerly Cisco Cloud APIC, could allow an unauthenticated, remote attacker to conduct a
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Policy Infrastructure Controller (APIC) | ||
Cisco Cloud Network Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of vulnerability cisco-sa-capic-csrfv-DMx6KSwV is classified as high.
To fix vulnerability cisco-sa-capic-csrfv-DMx6KSwV, it is recommended to apply the latest security patches provided by Cisco.
Vulnerability cisco-sa-capic-csrfv-DMx6KSwV affects users of Cisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller.
An unauthenticated remote attacker could conduct Cross-Site Request Forgery (CSRF) attacks using vulnerability cisco-sa-capic-csrfv-DMx6KSwV.
No, authentication is not required to exploit vulnerability cisco-sa-capic-csrfv-DMx6KSwV.