CVE-2024-20478

MEDIUM

Cisco APIC/Cloud Network Controller - Code Injection

Title source: llm
STIX 2.1

Description

A vulnerability in the software upgrade component of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Network Controller, formerly Cisco Cloud APIC, could allow an authenticated, remote attacker with Administrator-level privileges to install a modified software image, leading to arbitrary code injection on an affected system. This vulnerability is due to insufficient signature validation of software images. An attacker could exploit this vulnerability by installing a modified software image. A successful exploit could allow the attacker to execute arbitrary code on the affected system and elevate their privileges to root. Note: Administrators should always validate the hash of any upgrade image before uploading it to Cisco APIC and Cisco Cloud Network Controller.

Scores

CVSS v3 6.5
EPSS 0.0027
EPSS Percentile 50.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-250
Status published
Products (50)
cisco/application_policy_infrastructure_controller 1.1\(1d\)
cisco/application_policy_infrastructure_controller 1.1\(1j\)
cisco/application_policy_infrastructure_controller 1.1\(1n\)
cisco/application_policy_infrastructure_controller 1.1\(1o\)
cisco/application_policy_infrastructure_controller 1.1\(1r\)
cisco/application_policy_infrastructure_controller 1.1\(1s\)
cisco/application_policy_infrastructure_controller 1.1\(2h\)
cisco/application_policy_infrastructure_controller 1.1\(2i\)
cisco/application_policy_infrastructure_controller 1.1\(3f\)
cisco/application_policy_infrastructure_controller 1.1\(4e\)
... and 40 more
Published Aug 28, 2024
Tracked Since Feb 18, 2026