2017-10-16 12:31:07 -04:00
{
2019-03-18 02:51:28 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "psirt@cisco.com" ,
"ID" : "CVE-2016-6413" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2017-10-16 12:31:07 -04:00
{
2019-03-18 02:51:28 +00:00
"lang" : "eng" ,
"value" : "The installation procedure on Cisco Application Policy Infrastructure Controller (APIC) devices 1.3(2f) mishandles binary files, which allows local users to obtain root access via unspecified vectors, aka Bug ID CSCva50496."
2017-10-16 12:31:07 -04:00
}
2019-03-18 02:51:28 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "20160921 Cisco Application Policy Infrastructure Controller Binary Privilege Escalation Vulnerability" ,
"refsource" : "CISCO" ,
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-apic"
} ,
{
"name" : "1036872" ,
"refsource" : "SECTRACK" ,
"url" : "http://www.securitytracker.com/id/1036872"
}
]
}
}