ID

VAR-201512-0397


CVE

CVE-2015-6424


TITLE

Cisco Application Policy Infrastructure Controller Vulnerability that bypasses access restrictions in the boot manager

Trust: 0.8

sources: JVNDB: JVNDB-2015-006476

DESCRIPTION

The boot manager in Cisco Application Policy Infrastructure Controller (APIC) 1.1(0.920a) allows local users to bypass intended access restrictions and obtain single-user-mode root access via unspecified vectors, aka Bug ID CSCuu83985. The Cisco Application Policy Infrastructure Controller is a controller that automates the management of application-centric infrastructure (ACI). This issue is being tracked by Cisco Bug ID CSCuu83985

Trust: 2.52

sources: NVD: CVE-2015-6424 // JVNDB: JVNDB-2015-006476 // CNVD: CNVD-2015-08413 // BID: 79410 // VULHUB: VHN-84385

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-08413

AFFECTED PRODUCTS

vendor:ciscomodel:application policy infrastructure controllerscope:eqversion:1.1\(0.920a\)

Trust: 1.6

vendor:ciscomodel:application policy infrastructure controller softwarescope:eqversion:1.1(0.920a)

Trust: 0.8

vendor:ciscomodel:application policy infrastructure controller 1.1scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2015-08413 // JVNDB: JVNDB-2015-006476 // CNNVD: CNNVD-201512-496 // NVD: CVE-2015-6424

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6424
value: HIGH

Trust: 1.0

NVD: CVE-2015-6424
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-08413
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201512-496
value: HIGH

Trust: 0.6

VULHUB: VHN-84385
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-6424
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-08413
severity: MEDIUM
baseScore: 6.8
vectorString: AV:L/AC:L/AU:S/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-84385
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-08413 // VULHUB: VHN-84385 // JVNDB: JVNDB-2015-006476 // CNNVD: CNNVD-201512-496 // NVD: CVE-2015-6424

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-84385 // JVNDB: JVNDB-2015-006476 // NVD: CVE-2015-6424

THREAT TYPE

local

Trust: 0.9

sources: BID: 79410 // CNNVD: CNNVD-201512-496

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-201512-496

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006476

PATCH

title:cisco-sa-20151216-apicurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151216-apic

Trust: 0.8

title:Patch for Cisco Application Policy Infrastructure Controller Local Elevation of Efforturl:https://www.cnvd.org.cn/patchInfo/show/68821

Trust: 0.6

title:Cisco Application Policy Infrastructure Controller Repair measures for trust management vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59278

Trust: 0.6

sources: CNVD: CNVD-2015-08413 // JVNDB: JVNDB-2015-006476 // CNNVD: CNNVD-201512-496

EXTERNAL IDS

db:NVDid:CVE-2015-6424

Trust: 3.4

db:BIDid:79410

Trust: 2.6

db:SECTRACKid:1034468

Trust: 1.1

db:JVNDBid:JVNDB-2015-006476

Trust: 0.8

db:CNVDid:CNVD-2015-08413

Trust: 0.6

db:CNNVDid:CNNVD-201512-496

Trust: 0.6

db:VULHUBid:VHN-84385

Trust: 0.1

sources: CNVD: CNVD-2015-08413 // VULHUB: VHN-84385 // BID: 79410 // JVNDB: JVNDB-2015-006476 // CNNVD: CNNVD-201512-496 // NVD: CVE-2015-6424

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151216-apic

Trust: 2.6

url:http://www.securityfocus.com/bid/79410

Trust: 1.7

url:http://www.securitytracker.com/id/1034468

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6424

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6424

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2015-08413 // VULHUB: VHN-84385 // BID: 79410 // JVNDB: JVNDB-2015-006476 // CNNVD: CNNVD-201512-496 // NVD: CVE-2015-6424

CREDITS

Cisco

Trust: 0.9

sources: BID: 79410 // CNNVD: CNNVD-201512-496

SOURCES

db:CNVDid:CNVD-2015-08413
db:VULHUBid:VHN-84385
db:BIDid:79410
db:JVNDBid:JVNDB-2015-006476
db:CNNVDid:CNNVD-201512-496
db:NVDid:CVE-2015-6424

LAST UPDATE DATE

2024-11-23T22:34:55.792000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-08413date:2015-12-23T00:00:00
db:VULHUBid:VHN-84385date:2016-12-07T00:00:00
db:BIDid:79410date:2015-12-16T00:00:00
db:JVNDBid:JVNDB-2015-006476date:2015-12-21T00:00:00
db:CNNVDid:CNNVD-201512-496date:2015-12-21T00:00:00
db:NVDid:CVE-2015-6424date:2024-11-21T02:34:58.407

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-08413date:2015-12-23T00:00:00
db:VULHUBid:VHN-84385date:2015-12-18T00:00:00
db:BIDid:79410date:2015-12-16T00:00:00
db:JVNDBid:JVNDB-2015-006476date:2015-12-21T00:00:00
db:CNNVDid:CNNVD-201512-496date:2015-12-17T00:00:00
db:NVDid:CVE-2015-6424date:2015-12-18T11:59:00.123