cisco application-policy-infrastructure-controller CVE-2021-1580 vulnerability in Cisco Products
Published on August 25, 2021

Cisco Application Policy Infrastructure Controller Command Injection and File Upload Vulnerabilities
Multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow a remote attacker to perform a command injection or file upload attack on an affected system. For more information about these vulnerabilities, see the Details section of this advisory.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2021-1580 is exploitable with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
NONE

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2021-1580 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2021-1580

stack.watch emails you whenever new vulnerabilities are published in Cisco Application Policy Infrastructure Controller or Cisco Cloud Application Policy Infrastructure Controller. Just hit a watch button to start following.

 
 

Affected Versions

Cisco Application Policy Infrastructure Controller (APIC) Version n/a is affected by CVE-2021-1580

Exploit Probability

EPSS
1.86%
Percentile
82.84%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.