CVE-2023-20230
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
23/08/2023
Última modificación:
25/01/2024
Descripción
*** Pendiente de traducción *** A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to read, modify, or delete non-tenant policies (for example, access policies) created by users associated with a different security domain on an affected system.<br />
<br />
This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy for policies outside the tenant boundaries. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete policies created by users associated with a different security domain. Exploitation is not possible for policies under tenants that an attacker has no authorization to access.
Impacto
Puntuación base 3.x
5.40
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:cisco:application_policy_infrastructure_controller:*:*:*:*:*:*:*:* | 5.2 (incluyendo) | 5.2\(8d\) (excluyendo) |
cpe:2.3:a:cisco:application_policy_infrastructure_controller:*:*:*:*:*:*:*:* | 6.0 (incluyendo) | 6.0\(3d\) (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página