Severity
5.4MEDIUM
EPSS
0.2%
top 59.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 23

Description

A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to read, modify, or delete non-tenant policies (for example, access policies) created by users associated with a different security domain on an affected system. This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy for policies outside the tenant boundaries.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.5

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-fc53-p2c6-q69h: A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authentic2023-08-23
CVEList
CVE-2023-20230: A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authentic2023-08-23

📋Vendor Advisories

1
Cisco
Cisco Application Policy Infrastructure Controller Unauthorized Policy Actions Vulnerability2023-08-23
CVE-2023-20230 (MEDIUM CVSS 5.4) | A vulnerability in the restricted s | cvebase.io