Cisco has published advisory for one critical severity, one high severity vulnerability, and two medium severity vulnerabilities in Cisco APIC (Application Policy Infrastructure Controller). Successful exploitation of these vulnerabilities could allow attackers to take over the vulnerable Cisco appliances. The flaw CVE-2021-1579 with a base score of 8.8 is the second most high severity vulnerability among the four, allowing authenticated, remote attackers with Administrator read-only credentials to elevate privileges on an affected system. We recommend that all the Cisco and cloud APIC app owners read this post that tells how to fix CVE-2021-1579- A Privilege Escalation Vulnerability in Cisco APIC.
Four vulnerabilities uncovered in Cisco APIC and Cloud APIC are:
CVE-2021-1577: Arbitrary File Read and Write Vulnerability in Cisco APIC and Cloud APIC
CVE-2021-1579: Privilege Escalation Vulnerability in Cisco APIC and Cloud APIC
CVE-2021-1580: Command Injection Vulnerability in Cisco APIC and Cloud APIC
CVE-2021-1581: File Upload Vulnerability in Cisco APIC and Cloud APIC
Summary of CVE-2021-1579:
This is the second most high severity vulnerability of the four, with a CVSS score of 8.8. This vulnerability allows authenticated, remote attackers with Administrator read-only credentials to elevate privileges on an affected system. The flaw is due to an insufficient implementation of role-based access control (RBAC) in the Application Policy Infrastructure Controller (APIC). It affects both prim and cloud versions of APIC. This is an easily exploitable flaw. Attackers can exploit the flaw just by sending a specific API request using an app with admin write credentials.
Associated CVE ID | CVE-2021-1579 |
Description | A Privilege Escalation Vulnerability in Cisco APIC |
Associated ZDI ID | – |
CVSS Score | 8.8 High |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Impact Score | – |
Exploitability Score | – |
Attack Vector (AV) | Network |
Attack Complexity (AC) | Low |
Privilege Required (PR) | Low |
User Interaction (UI) | None |
Scope | Unchanged |
Confidentiality (C) | High |
Integrity (I) | High |
availability (a) | High |
The flaw affects both on-prem and cloud versions of APIC devices if they have installed and enabled apps with admin write privileges. The vulnerability is said to be affected by the versions that are less than and equal to v5.1.
To find the vulnerable APICs, you need to find embedded apps with admin write privileges on the APIC device. Follow these simple instructions to find the embedded apps installed with admin write privileges:
Log in to the web UI and click on the Apps tab.
Check the Permissions and Permission Level of the installed application by taking the mouse pointer over on the installed apps.
If you see Permission is set to admin and Permission Level is set to Write, then your APIC is vulnerable to the flaw.
If you can’t fix the vulnerability soon, you can disable or delete the app from APIC. Follow these simple steps to disable or delete the app from APIC.
Log in to the web UI and click on the Apps tab.
Check the Permissions and Permission Level of the installed application by taking the mouse pointer over on the installed apps.
If you see Permission is set to admin and Permission Level is set to Write, then you should either disable or delete the app.
Click on the icon that is a circle with a line to disable the app. Or, click the icon that is an X to delete the app.
Cisco published the fixed version of APIC in its advisory. As per the advisory, version 5.2 and later are not vulnerable to the Arbitrary File Read and Write vulnerability. We recommend all the users of the affected devices update the Cisco APIC to the latest available version as Cisco has acknowledged the vulnerability by releasing the free software updates. Please refer to the below table that shows the required actions to take on the different versions of APIC.
Cisco APIC or Cisco Cloud APIC Software Release | First Fixed Release |
---|---|
Earlier than 3.2 | Migrate to a fixed release. |
3.2 | 3.2(10e) |
4.0 | Migrate to a fixed release. |
4.1 | Migrate to a fixed release. |
4.2 | 4.2(6h) |
5.0 | Migrate to a fixed release. |
5.1 | 5.1(3e) |
5.2 | Not vulnerable. |
You can refer to these online docs from Cisco to upgrade your APICs. The biggest concern most of the uses have is the upgradation path and the process. It’s tricky and hard to make the decision as to which version to upgrade. The code selection process can get even more complex if you have dependencies such as AVE (ACI Virtual Edge), AVS (ACI Virtual Switch, or the ACI MSO (Multi-Site Orchestrator).
To help users, Cisco has developed an online tool ‘Cisco APIC Software Upgrade/Downgrade Support Matrix‘. This tool helps you provide upgrade and downgrade information such as a recommended path to upgrade or downgrade, the procedure to upgrade or downgrade, caveats, recommended software release, software no longer supported, open bugs of the target, and current release. This feature makes it a unique and must-have tool for those who plan either upgrade or downgrade the APIC.
All you need to choose the from and to release that’s it. If you want to upgrade 5.2(4) from 4.0, select the from and to versions.
We hope this post would help you know How to Fix CVE-2021-1579- A Privilege Escalation Vulnerability in Cisco APIC. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
You may also like these articles:
How To Fix CVE-2021-1577- A Critical Arbitrary File Read And Write Vulnerability In Cisco APIC
How To Fix CVE-2022-20732- A Privilege Escalation Vulnerability In Cisco VIM
How To Fix CVE-2022-20777- A Critical Guest Escape Vulnerability In Cisco NFVIS
How To Fix CVE-2022-20695- A Critical Authentication Bypass Vulnerability In Cisco WLC
What Is A Privilege Escalation Attack? How To Prevent Privilege Escalation Attacks?
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.