First published: Wed Aug 28 2024(Updated: )
A vulnerability in the software upgrade component of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Network Controller, formerly Cisco Cloud APIC, could allow an authenticated, remote attacker with Administrator-level privileges to
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Policy Infrastructure Controller (APIC) | ||
Cisco Cloud Network Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-capic-priv-esc-uYQJjnuU is classified as high due to its potential for privilege escalation.
To fix cisco-sa-capic-priv-esc-uYQJjnuU, apply the software updates provided by Cisco for the affected products.
Cisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller users with Administrator-level privileges are affected by cisco-sa-capic-priv-esc-uYQJjnuU.
An attacker exploiting cisco-sa-capic-priv-esc-uYQJjnuU could escalate their privileges and potentially take control of affected systems.
The vulnerability identified as cisco-sa-capic-priv-esc-uYQJjnuU was disclosed in a Cisco security advisory.