A vulnerability in the FUSE filesystem functionality for Cisco Application Policy Infrastructure Controller (APIC) software could allow an authenticated, local attacker to escalate privileges to root on an affected device. The vulnerability is due to insufficient input validation for certain command strings issued on the CLI of the affected device. An attacker with write permissions for files within a readable folder on the device could alter certain definitions in the affected file. A successful exploit could allow an attacker to cause the underlying FUSE driver to execute said crafted commands, elevating the attacker's privileges to root on an affected device.
History

Wed, 20 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2019-05-03T14:55:17.600857Z

Updated: 2024-11-20T17:23:53.756Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1682

cve-icon Vulnrichment

Updated: 2024-08-04T18:28:41.080Z

cve-icon NVD

Status : Analyzed

Published: 2019-05-03T15:29:00.777

Modified: 2020-10-07T18:11:31.143

Link: CVE-2019-1682

cve-icon Redhat

No data.