Cisco’s APIC Vulnerability: Are Your Port-Mgmt Permissions Leaving the Door Wide Open?

Cisco APIC vulnerability alert! If restricted security domains and port-mgmt permissions are your thing, you might want to double-check your setup. For the full scoop, see the Fixed Software section of this advisory.

Pro Dashboard

Hot Take:

Looks like Cisco’s APIC just needed a little more TLC than your average office printer. Who knew “port-mgmt” permissions could open a Pandora’s box of cybersecurity headaches?

Key Points:

  • Cisco APIC vulnerability related to “port-mgmt” permissions within restricted security domains.
  • Determining configuration requires specific CLI commands.
  • Both restricted security domains and user “port-mgmt” permissions must be present for vulnerability.
  • Fixed software releases are documented in Cisco’s advisory.
  • PSIRT validated affected and fixed release information.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?