Vulnerability Description
The boot manager in Cisco Application Policy Infrastructure Controller (APIC) 1.1(0.920a) allows local users to bypass intended access restrictions and obtain single-user-mode root access via unspecified vectors, aka Bug ID CSCuu83985.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Application Policy Infrastructure Controller | 1.1\(0.920a\) |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Vendor Advisory
- http://www.securityfocus.com/bid/79410
- http://www.securitytracker.com/id/1034468
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Vendor Advisory
- http://www.securityfocus.com/bid/79410
- http://www.securitytracker.com/id/1034468
FAQ
What is CVE-2015-6424?
CVE-2015-6424 is a vulnerability with a CVSS score of 7.2 (HIGH). The boot manager in Cisco Application Policy Infrastructure Controller (APIC) 1.1(0.920a) allows local users to bypass intended access restrictions and obtain single-user-mode root access via unspecif...
How severe is CVE-2015-6424?
CVE-2015-6424 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-6424?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Application Policy Infrastructure Controller.