CVE-2021-1577 vulnerability in Cisco Products
Published on August 25, 2021
Cisco Application Policy Infrastructure Controller Arbitrary File Read and Write Vulnerability
A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an unauthenticated, remote attacker to read or write arbitrary files on an affected system. This vulnerability is due to improper access control. An attacker could exploit this vulnerability by using a specific API endpoint to upload a file to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on an affected device.
Vulnerability Analysis
CVE-2021-1577 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is an Authorization Vulnerability?
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CVE-2021-1577 has been classified to as an Authorization vulnerability or weakness.
Products Associated with CVE-2021-1577
stack.watch emails you whenever new vulnerabilities are published in Cisco Application Policy Infrastructure Controller or Cisco Cloud Application Policy Infrastructure Controller. Just hit a watch button to start following.
Affected Versions
Cisco Application Policy Infrastructure Controller (APIC) Version n/a is affected by CVE-2021-1577Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.