cisco application-policy-infrastructure-controller CVE-2020-3139 is a vulnerability in Cisco Application Policy Infrastructure Controller
Published on January 26, 2020

Cisco Application Policy Infrastructure Controller Out Of Band Management IP Tables Bypass Vulnerability
A vulnerability in the out of band (OOB) management interface IP table rule programming for Cisco Application Policy Infrastructure Controller (APIC) could allow an unauthenticated, remote attacker to bypass configured deny entries for specific IP ports. These IP ports would be permitted to the OOB management interface when, in fact, the packets should be dropped. The vulnerability is due to the configuration of specific IP table entries for which there is a programming logic error that results in the IP port being permitted. An attacker could exploit this vulnerability by sending traffic to the OOB management interface on the targeted device. A successful exploit could allow the attacker to bypass configured IP table rules to drop specific IP port traffic. The attacker has no control over the configuration of the device itself. This vulnerability affects Cisco APIC releases prior to the first fixed software Release 4.2(3j).

Vendor Advisory NVD

Weakness Type

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.


Products Associated with CVE-2020-3139

Want to know whenever a new CVE is published for Cisco Application Policy Infrastructure Controller? stack.watch will email you.

 

Affected Versions

Cisco Application Policy Infrastructure Controller (APIC) Version prior to 4.2(3j) is affected by CVE-2020-3139

Exploit Probability

EPSS
0.22%
Percentile
44.41%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.