Логотип exploitDog
bind:CVE-2024-20279
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-20279

Количество 3

Количество 3

nvd логотип

CVE-2024-20279

больше 1 года назад

A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to modify the behavior of default system policies, such as quality of service (QoS) policies, on an affected system. This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete child policies created under default system policies, which are implicitly used by all tenants in the fabric, resulting in disruption of network traffic. Exploitation is not possible for policies under tenants that an attacker has no authorization to access.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-wxwr-gxwh-c78c

больше 1 года назад

A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to modify the behavior of default system policies, such as quality of service (QoS) policies, on an affected system. This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete child policies created under default system policies, which are implicitly used by all tenants in the fabric, resulting in disruption of network traffic. Exploitation is not possible for policies under tenants that an attacker has no authorization to access.

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2024-06599

больше 1 года назад

Уязвимость средства управления информационной инфраструктурой Cisco Application Policy Infrastructure Controller, позволяющая нарушителю изменить произвольные политики безопасности

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-20279

A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to modify the behavior of default system policies, such as quality of service (QoS) policies, on an affected system. This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete child policies created under default system policies, which are implicitly used by all tenants in the fabric, resulting in disruption of network traffic. Exploitation is not possible for policies under tenants that an attacker has no authorization to access.

CVSS3: 4.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-wxwr-gxwh-c78c

A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to modify the behavior of default system policies, such as quality of service (QoS) policies, on an affected system. This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete child policies created under default system policies, which are implicitly used by all tenants in the fabric, resulting in disruption of network traffic. Exploitation is not possible for policies under tenants that an attacker has no authorization to access.

CVSS3: 4.3
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-06599

Уязвимость средства управления информационной инфраструктурой Cisco Application Policy Infrastructure Controller, позволяющая нарушителю изменить произвольные политики безопасности

CVSS3: 4.3
0%
Низкий
больше 1 года назад

Уязвимостей на страницу