cisco application-policy-infrastructure-controller CVE-2019-1690 is a vulnerability in Cisco Application Policy Infrastructure Controller
Published on March 11, 2019

Cisco Application Policy Infrastructure Controller IPv6 Link-Local Address Vulnerability
A vulnerability in the management interface of Cisco Application Policy Infrastructure Controller (APIC) software could allow an unauthenticated, adjacent attacker to gain unauthorized access on an affected device. The vulnerability is due to a lack of proper access control mechanisms for IPv6 link-local connectivity imposed on the management interface of an affected device. An attacker on the same physical network could exploit this vulnerability by attempting to connect to the IPv6 link-local address on the affected device. A successful exploit could allow the attacker to bypass default access control restrictions on an affected device. Cisco Application Policy Infrastructure Controller (APIC) devices running versions prior to 4.2(0.21c) are affected.

Vendor Advisory NVD

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2019-1690 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2019-1690

Want to know whenever a new CVE is published for Cisco Application Policy Infrastructure Controller? stack.watch will email you.

 

Affected Versions

Cisco Application Policy Infrastructure Controller (APIC):

Exploit Probability

EPSS
0.11%
Percentile
28.78%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.