Impact
The vulnerability resides in the Object Model CLI component of Cisco Application Policy Infrastructure Controller and allows an authenticated, local attacker possessing any role with CLI access to issue crafted commands that trigger an unexpected device reload. This reload causes a denial‑of‑service condition, disrupting normal controller operation. The weakness stems from insufficient input validation of CLI commands.
Affected Systems
Cisco’s Application Policy Infrastructure Controller is affected. The vulnerability applies to any instance where a user has valid credentials and a role that grants CLI access. No specific version ranges are listed, so all deployed APIC appliances with the affected CLI component are potentially vulnerable.
Risk and Exploitability
The CVSS score of 5.5 places this issue in the medium severity range. The EPSS indicates a very low likelihood of exploitation, reflecting that only users with local CLI access can launch the attack. The vulnerability is not present in the CISA KEV catalog, suggesting it has not been observed in the wild. Exploitation requires credential compromise or lateral movement to an account with CLI privileges; an attacker can then issue a single crafted command to trigger a reload and achieve a local denial of service.
OpenCVE Enrichment