U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2017-6767

Change History

Initial Analysis by NIST 8/22/2017 2:12:04 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.0\(1e\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.0\(1h\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.0\(1k\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.0\(1n\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.0\(2j\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.0\(2m\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.0\(3f\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.0\(3i\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.0\(3k\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.0\(3n\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.0\(4h\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.0\(4o\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\(0.920a\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\(1j\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.1\(3f\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\(2\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\(3\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2.2:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2_base:*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\(1\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\(2\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\(2f\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\(1\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0_base:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:H/Au:S/C:P/I:P/A:P)
Added CVSS V3

								
							
							
						
AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-264
Changed Reference Type
http://www.securityfocus.com/bid/100400 No Types Assigned
http://www.securityfocus.com/bid/100400 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1039180 No Types Assigned
http://www.securitytracker.com/id/1039180 Third Party Advisory, VDB Entry
Changed Reference Type
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-apic1 No Types Assigned
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-apic1 Vendor Advisory