SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Cisco Application Policy Infrastructure Controller Vendors:   Cisco
Cisco Application Policy Infrastructure Controller Lets Remote Users Bypass the Firewall
SecurityTracker Alert ID:  1039716
SecurityTracker URL:  http://securitytracker.com/id/1039716
CVE Reference:   CVE-2017-12262   (Links to External Site)
Date:  Nov 1 2017
Impact:   Host/resource access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior 1.5
Description:   A vulnerability was reported in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM). A remote user on the local network can bypass security controls on the target system.

A remote user on the local network can exploit an incorrect firewall rule to bypass the firewall and access internal network resources.

The vendor has assigned bug ID CSCve89638 to this vulnerability.

Georgi Geshev of MWR InfoSecurity reported this vulnerability.

Impact:   A remote user on the local network can bypass the firewall to access resources on the protected network.
Solution:   The vendor has issued a fix.

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-apicem

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-apicem (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents

Subject:  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-apicem

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC