Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20107: Insufficient Granularity of Access Control in Cisco Cisco Application Policy Infrastructure Controller (APIC)

0
Medium
VulnerabilityCVE-2026-20107cvecve-2026-20107
Published: Wed Feb 25 2026 (02/25/2026, 16:14:33 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Application Policy Infrastructure Controller (APIC)

Description

A vulnerability in the Object Model CLI component of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, local attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. To exploit this vulnerability, the attacker must have valid user credentials and any role that includes CLI access. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by issuing crafted commands at the CLI prompt. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:25:59 UTC

Technical Analysis

CVE-2026-20107 is a vulnerability identified in the Object Model CLI component of Cisco Application Policy Infrastructure Controller (APIC), specifically affecting versions 6.1(1f), 6.1(2f), 6.1(2g), 6.1(3f), and 6.1(3g). The root cause is insufficient input validation of commands entered via the CLI prompt. An authenticated attacker possessing valid credentials and any role that includes CLI access can exploit this flaw by issuing specially crafted commands. Successful exploitation triggers an unexpected device reload, causing a denial of service (DoS) condition that disrupts network policy management and automation functions reliant on APIC. The vulnerability does not impact confidentiality or integrity but severely affects availability. The attack vector is local, requiring low attack complexity and no user interaction, but it does require privileges to access the CLI. No public exploits or active exploitation have been reported to date. The vulnerability highlights the importance of strict input validation and access control granularity in network management platforms. Cisco has published the vulnerability with a CVSS 3.1 base score of 5.5, reflecting medium severity due to the limited scope of impact and required privileges.

Potential Impact

The primary impact of CVE-2026-20107 is a denial of service condition caused by unexpected device reloads of Cisco APIC controllers. This can disrupt network policy enforcement, automation, and overall fabric management in data centers and enterprise networks relying on Cisco ACI (Application Centric Infrastructure). Organizations may experience temporary loss of network control, degraded performance, and operational downtime, potentially affecting business continuity. While the vulnerability does not expose sensitive data or allow unauthorized changes, the loss of availability in critical network infrastructure can have cascading effects on dependent applications and services. Attackers with valid credentials could intentionally disrupt network operations, leading to increased operational costs and potential reputational damage. The requirement for authenticated CLI access limits the attack surface to insiders or compromised accounts, but insider threats or credential theft scenarios increase risk. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in environments with weak credential management or insufficient access controls.

Mitigation Recommendations

To mitigate CVE-2026-20107, organizations should: 1) Apply Cisco-provided patches or updates as soon as they become available for the affected APIC versions. 2) Restrict CLI access strictly to trusted administrators and enforce the principle of least privilege, ensuring only necessary roles have CLI permissions. 3) Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 4) Monitor and audit CLI access logs for unusual or unauthorized command usage to detect potential exploitation attempts early. 5) Employ network segmentation and access controls to limit local access to APIC devices, reducing the likelihood of unauthorized local attacks. 6) Regularly review and update user roles and permissions to ensure granularity aligns with operational needs, minimizing exposure. 7) Conduct security awareness training for administrators to recognize and prevent misuse of credentials or access. 8) Consider deploying intrusion detection/prevention systems (IDS/IPS) that can alert on anomalous CLI command patterns. These measures collectively reduce the risk of exploitation and limit the impact if an attack occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.372Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b6fb7ef31ef0b55569e

Added to database: 2/25/2026, 9:36:47 PM

Last enriched: 2/27/2026, 9:25:59 PM

Last updated: 4/12/2026, 12:26:50 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses