Cisco Application Policy Infrastructure Controller Access Control Vulnerability
The vulnerability is due to improper implementation of access controls in the APIC filesystem. An attacker could exploit this vulnerability by accessing the cluster management configuration of the APIC. An exploit could allow the attacker to gain access to the APIC as the root user and perform root-level commands.
Cisco has released software updates that address this vulnerability. This advisory is available at the following link:
http://ift.tt/1CQ6nwC
from Cisco Security Advisory http://ift.tt/1CQ6nwC