All the vulnerabilites related to Cisco - Nexus 9500 R-Series Line Cards and Fabric Modules
cve-2019-1615
Vulnerability from cvelistv5
Published
2019-03-11 22:00
Modified
2024-11-20 17:25
Severity ?
EPSS score ?
Summary
Cisco NX-OS Software Image Signature Verification Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-sig-verif | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107397 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Nexus 3000 Series Switches |
Version: unspecified < 7.0(3)I7(5) |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190306 Cisco NX-OS Software Image Signature Verification Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-sig-verif" }, { "name": "107397", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107397" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1615", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:55:34.892785Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:25:47.025Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Fabric Switches in ACI Mode", "vendor": "Cisco", "versions": [ { "lessThan": "13.2(1l)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software image on an affected device. The vulnerability is due to improper verification of digital signatures for software images. An attacker could exploit this vulnerability by loading an unsigned software image on an affected device. A successful exploit could allow the attacker to boot a malicious software image. Note: The fix for this vulnerability requires a BIOS upgrade as part of the software upgrade. For additional information, see the Details section of this advisory. Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I7(5). Nexus 9000 Series Fabric Switches in ACI Mode are affected running software versions prior to 13.2(1l). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I7(5). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-15T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190306 Cisco NX-OS Software Image Signature Verification Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-sig-verif" }, { "name": "107397", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107397" } ], "source": { "advisory": "cisco-sa-20190306-nxos-sig-verif", "defect": [ [ "CSCvj14135", "CSCvk70903", "CSCvk70905" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software Image Signature Verification Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1615", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software Image Signature Verification Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(5)" } ] } }, { "product_name": "Nexus 9000 Series Fabric Switches in ACI Mode", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "13.2(1l)" } ] } }, { "product_name": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(5)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software image on an affected device. The vulnerability is due to improper verification of digital signatures for software images. An attacker could exploit this vulnerability by loading an unsigned software image on an affected device. A successful exploit could allow the attacker to boot a malicious software image. Note: The fix for this vulnerability requires a BIOS upgrade as part of the software upgrade. For additional information, see the Details section of this advisory. Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I7(5). Nexus 9000 Series Fabric Switches in ACI Mode are affected running software versions prior to 13.2(1l). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I7(5). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.7", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-347" } ] } ] }, "references": { "reference_data": [ { "name": "20190306 Cisco NX-OS Software Image Signature Verification Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-sig-verif" }, { "name": "107397", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107397" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-sig-verif", "defect": [ [ "CSCvj14135", "CSCvk70903", "CSCvk70905" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1615", "datePublished": "2019-03-11T22:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:25:47.025Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1603
Vulnerability from cvelistv5
Published
2019-03-08 19:00
Modified
2024-11-20 17:26
Severity ?
EPSS score ?
Summary
Cisco NX-OS Software Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/107328 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesc | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Nexus 3000 Series Switches |
Version: unspecified < 7.0(3)I7(4) |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.374Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "107328", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107328" }, { "name": "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesc" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1603", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:55:41.625331Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:26:24.528Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches-Standalone", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to escalate lower-level privileges to the administrator level. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. A successful exploit could allow an attacker to make configuration changes to the system as administrator. Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-09T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "107328", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107328" }, { "name": "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesc" } ], "source": { "advisory": "cisco-sa-20190306-nxos-privesc", "defect": [ [ "CSCvh24810", "CSCvj00330" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1603", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 9000 Series Switches-Standalone", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to escalate lower-level privileges to the administrator level. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. A successful exploit could allow an attacker to make configuration changes to the system as administrator. Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.8", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285" } ] } ] }, "references": { "reference_data": [ { "name": "107328", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107328" }, { "name": "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesc" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-privesc", "defect": [ [ "CSCvh24810", "CSCvj00330" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1603", "datePublished": "2019-03-08T19:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:26:24.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1612
Vulnerability from cvelistv5
Published
2019-03-11 22:00
Modified
2024-11-21 19:43
Severity ?
EPSS score ?
Summary
Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1612)
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1612 | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107388 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Nexus 3000 Series Switches |
Version: unspecified < 7.0(3)I4(9) Version: unspecified < 7.0(3)I7(4) |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.369Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190306 Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1612)", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1612" }, { "name": "107388", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107388" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1612", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T19:00:06.696498Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:43:05.265Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected running software versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Stand are affected running software versions prior to 7.0(3)F3(5)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-14T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190306 Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1612)", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1612" }, { "name": "107388", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107388" } ], "source": { "advisory": "cisco-sa-20190306-nxos-cmdinj-1612", "defect": [ [ "CSCvi42373", "CSCvj12009" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1612)", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1612", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1612)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected running software versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Stand are affected running software versions prior to 7.0(3)F3(5)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.2", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "20190306 Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1612)", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1612" }, { "name": "107388", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107388" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-cmdinj-1612", "defect": [ [ "CSCvi42373", "CSCvj12009" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1612", "datePublished": "2019-03-11T22:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:43:05.265Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1602
Vulnerability from cvelistv5
Published
2019-03-08 19:00
Modified
2024-11-20 17:26
Severity ?
EPSS score ?
Summary
Cisco NX-OS Software Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-escalation | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107332 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Nexus 3000 Series Switches |
Version: unspecified < 7.0(3)I7(4) |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.254Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-escalation" }, { "name": "107332", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107332" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1602", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:55:43.076323Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:26:34.718Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches-Standalone", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive data that could be used to elevate their privileges to administrator. The vulnerability is due to improper implementation of filesystem permissions. An attacker could exploit this vulnerability by logging in to the CLI of an affected device, accessing a specific file, and leveraging this information to authenticate to the NX-API server. A successful exploit could allow an attacker to make configuration changes as administrator. Note: NX-API is disabled by default. Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-09T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-escalation" }, { "name": "107332", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107332" } ], "source": { "advisory": "cisco-sa-20190306-nxos-escalation", "defect": [ [ "CSCvj59009", "CSCvk70659" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1602", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 9000 Series Switches-Standalone", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive data that could be used to elevate their privileges to administrator. The vulnerability is due to improper implementation of filesystem permissions. An attacker could exploit this vulnerability by logging in to the CLI of an affected device, accessing a specific file, and leveraging this information to authenticate to the NX-API server. A successful exploit could allow an attacker to make configuration changes as administrator. Note: NX-API is disabled by default. Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.8", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-escalation" }, { "name": "107332", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107332" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-escalation", "defect": [ [ "CSCvj59009", "CSCvk70659" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1602", "datePublished": "2019-03-08T19:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:26:34.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1600
Vulnerability from cvelistv5
Published
2019-03-07 20:00
Modified
2024-11-20 17:26
Severity ?
EPSS score ?
Summary
Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/107399 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107404 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Firepower 4100 Series Next-Generation Firewalls |
Version: unspecified < 2.2.2.91 Version: unspecified < 2.3.1.110 |
||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "107399", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107399" }, { "name": "20190306 Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory" }, { "name": "107404", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107404" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1600", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:55:46.371130Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:26:53.055Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Firepower 4100 Series Next-Generation Firewalls", "vendor": "Cisco", "versions": [ { "lessThan": "2.2.2.91", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "2.3.1.110", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firepower 9300 Series Next-Generation Firewalls", "vendor": "Cisco", "versions": [ { "lessThan": "2.2.2.91", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "2.3.1.110", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "MDS 9000 Series Multilayer Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(25)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.1(1b)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.3(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.0(2)A8(10)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 2000, 5500, 5600, and 6000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.1(5)N1(1b)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.3(3)N1(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 7000 and 7700 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(22)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.3(3)D1(1)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.2(3)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches-Standalone", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive information that is stored in the file system of an affected system. The vulnerability is due to improper implementation of file system permissions. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow the attacker to access sensitive and critical files. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. Firepower 9300 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-15T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "107399", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107399" }, { "name": "20190306 Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory" }, { "name": "107404", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107404" } ], "source": { "advisory": "cisco-sa-20190306-nxos-directory", "defect": [ [ "CSCvh75886", "CSCvh75949", "CSCvi96549", "CSCvi96551", "CSCvi96554", "CSCvi96559" ] ], "discovery": "INTERNAL" }, "title": "Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1600", "STATE": "PUBLIC", "TITLE": "Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firepower 4100 Series Next-Generation Firewalls", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.2.2.91" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.3.1.110" } ] } }, { "product_name": "Firepower 9300 Series Next-Generation Firewalls", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.2.2.91" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.3.1.110" } ] } }, { "product_name": "MDS 9000 Series Multilayer Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(25)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.1(1b)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.3(1)" } ] } }, { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.0(2)A8(10)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 2000, 5500, 5600, and 6000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.1(5)N1(1b)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.3(3)N1(1)" } ] } }, { "product_name": "Nexus 7000 and 7700 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(22)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.3(3)D1(1)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.2(3)" } ] } }, { "product_name": "Nexus 9000 Series Switches-Standalone", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive information that is stored in the file system of an affected system. The vulnerability is due to improper implementation of file system permissions. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow the attacker to access sensitive and critical files. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. Firepower 9300 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.7", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "107399", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107399" }, { "name": "20190306 Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory" }, { "name": "107404", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107404" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-directory", "defect": [ [ "CSCvh75886", "CSCvh75949", "CSCvi96549", "CSCvi96551", "CSCvi96554", "CSCvi96559" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1600", "datePublished": "2019-03-07T20:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:26:53.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1609
Vulnerability from cvelistv5
Published
2019-03-08 20:00
Modified
2024-11-21 19:43
Severity ?
EPSS score ?
Summary
Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1609)
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/107341 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1609 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | MDS 9000 Series Multilayer Switches |
Version: unspecified < 6.2(27) Version: unspecified < 8.1(1b) Version: unspecified < 8.3(2) |
||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "107341", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107341" }, { "name": "20190306 Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1609)", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1609" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1609", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T19:00:10.831380Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:43:28.296Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "MDS 9000 Series Multilayer Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(27)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.1(1b)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.3(2)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(6)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(6)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 7000 and 7700 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(22)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.3(3)D1(1)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.2(3)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.3(2)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(6)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(27), 8.1(1b), and 8.3(2). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(6). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), 8.2(3), and 8.3(2). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I4(9) and7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-11T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "107341", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107341" }, { "name": "20190306 Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1609)", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1609" } ], "source": { "advisory": "cisco-sa-20190306-nxos-cmdinj-1609", "defect": [ [ "CSCvj63253", "CSCvk51387", "CSCvk51388" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1609)", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1609", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1609)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MDS 9000 Series Multilayer Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(27)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.1(1b)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.3(2)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(6)" } ] } }, { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(6)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 7000 and 7700 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(22)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.3(3)D1(1)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.2(3)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.3(2)" } ] } }, { "product_name": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(6)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(27), 8.1(1b), and 8.3(2). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(6). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), 8.2(3), and 8.3(2). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I4(9) and7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.2", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "107341", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107341" }, { "name": "20190306 Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1609)", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1609" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-cmdinj-1609", "defect": [ [ "CSCvj63253", "CSCvk51387", "CSCvk51388" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1609", "datePublished": "2019-03-08T20:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:43:28.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1616
Vulnerability from cvelistv5
Published
2019-03-11 22:00
Modified
2024-11-19 19:15
Severity ?
EPSS score ?
Summary
Cisco NX-OS Software Cisco Fabric Services Denial of Service Vulnerability
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/107395 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-fabric-dos | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | MDS 9000 Series Multilayer Switches |
Version: unspecified < 6.2(25) Version: unspecified < 8.1(1b) Version: unspecified < 8.3(1) |
||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.351Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "107395", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107395" }, { "name": "20190306 Cisco NX-OS Software Cisco Fabric Services Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-fabric-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1616", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:25:17.931759Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:15:32.416Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "MDS 9000 Series Multilayer Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(25)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.1(1b)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.3(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.0(2)A8(10)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 7000 and 7700 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(22)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.2(3)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "UCS 6200, 6300, and 6400 Fabric Interconnects", "vendor": "Cisco", "versions": [ { "lessThan": "3.2(3j)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "4.0(2a)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Fabric Services component of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Cisco Fabric Services packets. An attacker could exploit this vulnerability by sending a crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow, resulting in process crashes and a DoS condition on the device. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(25), 8.1(1b), 8.3(1). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5) Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). UCS 6200, 6300, and 6400 Fabric Interconnects are affected running software versions prior to 3.2(3j) and 4.0(2a)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-14T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "107395", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107395" }, { "name": "20190306 Cisco NX-OS Software Cisco Fabric Services Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-fabric-dos" } ], "source": { "advisory": "cisco-sa-20190306-nxos-fabric-dos", "defect": [ [ "CSCvh99066", "CSCvj10176", "CSCvj10178", "CSCvj10181", "CSCvj10183" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software Cisco Fabric Services Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1616", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software Cisco Fabric Services Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MDS 9000 Series Multilayer Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(25)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.1(1b)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.3(1)" } ] } }, { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.0(2)A8(10)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 7000 and 7700 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(22)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.2(3)" } ] } }, { "product_name": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "UCS 6200, 6300, and 6400 Fabric Interconnects", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "3.2(3j)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.0(2a)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cisco Fabric Services component of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Cisco Fabric Services packets. An attacker could exploit this vulnerability by sending a crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow, resulting in process crashes and a DoS condition on the device. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(25), 8.1(1b), 8.3(1). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5) Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). UCS 6200, 6300, and 6400 Fabric Interconnects are affected running software versions prior to 3.2(3j) and 4.0(2a)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "107395", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107395" }, { "name": "20190306 Cisco NX-OS Software Cisco Fabric Services Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-fabric-dos" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-fabric-dos", "defect": [ [ "CSCvh99066", "CSCvj10176", "CSCvj10178", "CSCvj10181", "CSCvj10183" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1616", "datePublished": "2019-03-11T22:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-19T19:15:32.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1596
Vulnerability from cvelistv5
Published
2019-03-07 19:00
Modified
2024-11-20 17:27
Severity ?
EPSS score ?
Summary
Cisco NX-OS Software Bash Shell Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-pe | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107340 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Nexus 3000 Series Switches |
Version: unspecified < 7.0(3)I7(4) |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.291Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190306 Cisco NX-OS Software Bash Shell Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-pe" }, { "name": "107340", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107340" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1596", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:55:47.903480Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:27:02.306Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticated, local attacker to escalate their privilege level to root. The attacker must authenticate with valid user credentials. The vulnerability is due to incorrect permissions of a system executable. An attacker could exploit this vulnerability by authenticating to the device and entering a crafted command at the Bash prompt. A successful exploit could allow the attacker to escalate their privilege level to root. Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-11T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190306 Cisco NX-OS Software Bash Shell Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-pe" }, { "name": "107340", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107340" } ], "source": { "advisory": "cisco-sa-20190306-nxos-pe", "defect": [ [ "CSCvj58962", "CSCvk71078" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software Bash Shell Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1596", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software Bash Shell Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Bash shell implementation for Cisco NX-OS Software could allow an authenticated, local attacker to escalate their privilege level to root. The attacker must authenticate with valid user credentials. The vulnerability is due to incorrect permissions of a system executable. An attacker could exploit this vulnerability by authenticating to the device and entering a crafted command at the Bash prompt. A successful exploit could allow the attacker to escalate their privilege level to root. Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.8", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "20190306 Cisco NX-OS Software Bash Shell Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-pe" }, { "name": "107340", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107340" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-pe", "defect": [ [ "CSCvj58962", "CSCvk71078" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1596", "datePublished": "2019-03-07T19:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:27:02.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1599
Vulnerability from cvelistv5
Published
2019-03-07 20:00
Modified
2024-11-19 19:15
Severity ?
EPSS score ?
Summary
Cisco NX-OS Software Netstack Denial of Service Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-netstack | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107342 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Nexus 1000V Switch for Microsoft Hyper-V |
Version: unspecified < 5.2(1)SM3(2.1) |
||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190306 Cisco NX-OS Software Netstack Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-netstack" }, { "name": "107342", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107342" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1599", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:25:19.239562Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:15:41.039Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Nexus 1000V Switch for Microsoft Hyper-V", "vendor": "Cisco", "versions": [ { "lessThan": "5.2(1)SM3(2.1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 1000V Switch for VMware vSphere", "vendor": "Cisco", "versions": [ { "lessThan": "5.2(1)SV3(4.1a)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(6)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "9.2(2)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.0(2)A8(11)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(6)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "9.2(2)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "9.2(2)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 5500, 5600, and 6000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.1(5)N1(1b)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.3(5)N1(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 7000 and 7700 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(22)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.3(3)D1(1)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.2(3)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.3(2)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(6)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "9.2(2)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "9.2(2)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "UCS 6200 and 6300 Series Fabric Interconnect", "vendor": "Cisco", "versions": [ { "lessThan": "3.2(3j)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "4.0(2a)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "UCS 6400 Series Fabric Interconnect", "vendor": "Cisco", "versions": [ { "lessThan": "4.0(2a)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to an issue with allocating and freeing memory buffers in the network stack. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device in a sustained way. A successful exploit could cause the network stack of an affected device to run out of available buffers, impairing operations of control plane and management plane protocols, resulting in a DoS condition. Note: This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device. Nexus 1000V Switch for Microsoft Hyper-V is affected in versions prior to 5.2(1)SM3(2.1). Nexus 1000V Switch for VMware vSphere is affected in versions prior to 5.2(1)SV3(4.1a). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(6) and 9.2(2). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(11), 7.0(3)I7(6), and 9.2(2). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5) and 9.2(2). Nexus 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(5)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22. Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5) and 9.2(2). UCS 6200 and 6300 Series Fabric Interconnect are affected in versions prior to 3.2(3j) and 4.0(2a). UCS 6400 Series Fabric Interconnect are affected in versions prior to 4.0(2a)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-11T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190306 Cisco NX-OS Software Netstack Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-netstack" }, { "name": "107342", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107342" } ], "source": { "advisory": "cisco-sa-20190306-nxos-netstack", "defect": [ [ "CSCvk55013", "CSCvm53108", "CSCvm53112", "CSCvm53113", "CSCvm53114", "CSCvm53115", "CSCvm53116", "CSCvm53125", "CSCvm53128" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software Netstack Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1599", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software Netstack Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Nexus 1000V Switch for Microsoft Hyper-V", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "5.2(1)SM3(2.1)" } ] } }, { "product_name": "Nexus 1000V Switch for VMware vSphere", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "5.2(1)SV3(4.1a)" } ] } }, { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(6)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "9.2(2)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.0(2)A8(11)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(6)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "9.2(2)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "9.2(2)" } ] } }, { "product_name": "Nexus 5500, 5600, and 6000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.1(5)N1(1b)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.3(5)N1(1)" } ] } }, { "product_name": "Nexus 7000 and 7700 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(22)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.3(3)D1(1)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.2(3)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.3(2)" } ] } }, { "product_name": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(6)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "9.2(2)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "9.2(2)" } ] } }, { "product_name": "UCS 6200 and 6300 Series Fabric Interconnect", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "3.2(3j)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.0(2a)" } ] } }, { "product_name": "UCS 6400 Series Fabric Interconnect", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.0(2a)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to an issue with allocating and freeing memory buffers in the network stack. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device in a sustained way. A successful exploit could cause the network stack of an affected device to run out of available buffers, impairing operations of control plane and management plane protocols, resulting in a DoS condition. Note: This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device. Nexus 1000V Switch for Microsoft Hyper-V is affected in versions prior to 5.2(1)SM3(2.1). Nexus 1000V Switch for VMware vSphere is affected in versions prior to 5.2(1)SV3(4.1a). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(6) and 9.2(2). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(11), 7.0(3)I7(6), and 9.2(2). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5) and 9.2(2). Nexus 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(5)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22. Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5) and 9.2(2). UCS 6200 and 6300 Series Fabric Interconnect are affected in versions prior to 3.2(3j) and 4.0(2a). UCS 6400 Series Fabric Interconnect are affected in versions prior to 4.0(2a)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "20190306 Cisco NX-OS Software Netstack Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-netstack" }, { "name": "107342", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107342" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-netstack", "defect": [ [ "CSCvk55013", "CSCvm53108", "CSCvm53112", "CSCvm53113", "CSCvm53114", "CSCvm53115", "CSCvm53116", "CSCvm53125", "CSCvm53128" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1599", "datePublished": "2019-03-07T20:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-19T19:15:41.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1611
Vulnerability from cvelistv5
Published
2019-03-11 22:00
Modified
2024-11-21 19:43
Severity ?
EPSS score ?
Summary
Cisco FXOS and NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1611)
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/107381 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1611 | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Firepower 4100 Series Next-Generation Firewalls |
Version: unspecified < 2.2.2.91 Version: unspecified < 2.3.1.110 Version: unspecified < 2.4.1.222 |
||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.440Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "107381", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107381" }, { "name": "20190306 Cisco FXOS and NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1611)", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1611" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1611", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T19:00:08.155038Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:43:12.933Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Firepower 4100 Series Next-Generation Firewalls", "vendor": "Cisco", "versions": [ { "lessThan": "2.2.2.91", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "2.3.1.110", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "2.4.1.222", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Firepower 9300 Security Appliance", "vendor": "Cisco", "versions": [ { "lessThan": "2.2.2.91", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "2.3.1.110", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "2.4.1.222", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "MDS 9000 Series Multilayer Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(25)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.3(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 2000, 5500, 5600, and 6000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.1(5)N1(1b)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.3(4)N1(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 7000 and 7700 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(22)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.3(3)D1(1)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.2(3)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco NX-OS Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Firepower 4100 Series Next-Generation Firewalls are affected running software versions prior to 2.2.2.91, 2.3.1.110, and 2.4.1.222. Firepower 9300 Security Appliance are affected running software versions prior to 2.2.2.91, 2.3.1.110, and 2.4.1.222. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(25) and 8.3(1). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(5). Nexus 3500 Platform Switches are affected running software versions prior to 7.0(3)I7(5). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected running software versions prior to 7.1(5)N1(1b) and 7.3(4)N1(1). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22), 7.3(3)D1(1), 8.2(3). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(5). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-14T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "107381", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107381" }, { "name": "20190306 Cisco FXOS and NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1611)", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1611" } ], "source": { "advisory": "cisco-sa-20190306-nxos-cmdinj-1611", "defect": [ [ "CSCvj63798", "CSCvj65666", "CSCvk65444", "CSCvk65447", "CSCvk65482" ] ], "discovery": "INTERNAL" }, "title": "Cisco FXOS and NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1611)", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1611", "STATE": "PUBLIC", "TITLE": "Cisco FXOS and NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1611)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firepower 4100 Series Next-Generation Firewalls", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.2.2.91" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.3.1.110" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.4.1.222" } ] } }, { "product_name": "Firepower 9300 Security Appliance", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.2.2.91" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.3.1.110" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "2.4.1.222" } ] } }, { "product_name": "MDS 9000 Series Multilayer Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(25)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.3(1)" } ] } }, { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(5)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(5)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 2000, 5500, 5600, and 6000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.1(5)N1(1b)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.3(4)N1(1)" } ] } }, { "product_name": "Nexus 7000 and 7700 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(22)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.3(3)D1(1)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.2(3)" } ] } }, { "product_name": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(5)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the CLI of Cisco NX-OS Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Firepower 4100 Series Next-Generation Firewalls are affected running software versions prior to 2.2.2.91, 2.3.1.110, and 2.4.1.222. Firepower 9300 Security Appliance are affected running software versions prior to 2.2.2.91, 2.3.1.110, and 2.4.1.222. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(25) and 8.3(1). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(5). Nexus 3500 Platform Switches are affected running software versions prior to 7.0(3)I7(5). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected running software versions prior to 7.1(5)N1(1b) and 7.3(4)N1(1). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22), 7.3(3)D1(1), 8.2(3). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(5). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.2", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "107381", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107381" }, { "name": "20190306 Cisco FXOS and NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1611)", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1611" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-cmdinj-1611", "defect": [ [ "CSCvj63798", "CSCvj65666", "CSCvk65444", "CSCvk65447", "CSCvk65482" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1611", "datePublished": "2019-03-11T22:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:43:12.933Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1605
Vulnerability from cvelistv5
Published
2019-03-08 20:00
Modified
2024-11-20 17:26
Severity ?
EPSS score ?
Summary
Cisco NX-OS Software NX-API Arbitrary Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/107313 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-api-ex | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | MDS 9000 Series Multilayer Switches |
Version: unspecified < 8.1(1) |
||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.275Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "107313", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107313" }, { "name": "20190306 Cisco NX-OS Software NX-API Arbitrary Code Execution Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-api-ex" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1605", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:55:38.123309Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:26:05.786Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "MDS 9000 Series Multilayer Switches", "vendor": "Cisco", "versions": [ { "lessThan": "8.1(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(8)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.0(2)A8(8)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 2000, 5500, 5600, and 6000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.3(2)N1(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 7000 and 7700 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.3(3)D1(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(8)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary code as root. The vulnerability is due to incorrect input validation in the NX-API feature. An attacker could exploit this vulnerability by sending a crafted HTTP or HTTPS request to an internal service on an affected device that has the NX-API feature enabled. A successful exploit could allow the attacker to cause a buffer overflow and execute arbitrary code as root. Note: The NX-API feature is disabled by default. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.1(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(8) and 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(8). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.3(2)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 7.3(3)D1(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I4(8) and 7.0(3)I7(1). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-09T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "107313", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107313" }, { "name": "20190306 Cisco NX-OS Software NX-API Arbitrary Code Execution Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-api-ex" } ], "source": { "advisory": "cisco-sa-20190306-nx-os-api-ex", "defect": [ [ "CSCvh77526", "CSCvi99224", "CSCvi99225", "CSCvi99227", "CSCvi99228" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software NX-API Arbitrary Code Execution Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1605", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software NX-API Arbitrary Code Execution Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MDS 9000 Series Multilayer Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.1(1)" } ] } }, { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(8)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(1)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.0(2)A8(8)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 2000, 5500, 5600, and 6000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.3(2)N1(1)" } ] } }, { "product_name": "Nexus 7000 and 7700 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.3(3)D1(1)" } ] } }, { "product_name": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(8)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(1)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary code as root. The vulnerability is due to incorrect input validation in the NX-API feature. An attacker could exploit this vulnerability by sending a crafted HTTP or HTTPS request to an internal service on an affected device that has the NX-API feature enabled. A successful exploit could allow the attacker to cause a buffer overflow and execute arbitrary code as root. Note: The NX-API feature is disabled by default. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.1(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(8) and 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(8). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.3(2)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 7.3(3)D1(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I4(8) and 7.0(3)I7(1). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.8", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "107313", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107313" }, { "name": "20190306 Cisco NX-OS Software NX-API Arbitrary Code Execution Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-api-ex" } ] }, "source": { "advisory": "cisco-sa-20190306-nx-os-api-ex", "defect": [ [ "CSCvh77526", "CSCvi99224", "CSCvi99225", "CSCvi99227", "CSCvi99228" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1605", "datePublished": "2019-03-08T20:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:26:05.786Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1613
Vulnerability from cvelistv5
Published
2019-03-11 22:00
Modified
2024-11-21 19:42
Severity ?
EPSS score ?
Summary
Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1613)
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1613 | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107392 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | MDS 9000 Series Multilayer Switches |
Version: unspecified < 6.2(27) Version: unspecified < 8.2(3) |
||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.285Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190306 Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1613)", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1613" }, { "name": "107392", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107392" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1613", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T19:00:04.816227Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:42:56.484Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "MDS 9000 Series Multilayer Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(27)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.2(3)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(6)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.0(2)A8(11)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(6)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(6)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 7000 and 7700 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(22)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.2(3)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(27) and 8.2(3). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(11) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9), 7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-14T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190306 Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1613)", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1613" }, { "name": "107392", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107392" } ], "source": { "advisory": "cisco-sa-20190306-nxos-cmdinj-1613", "defect": [ [ "CSCvj63807", "CSCvj65654", "CSCvk50903", "CSCvk50906" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1613)", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1613", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1613)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MDS 9000 Series Multilayer Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(27)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.2(3)" } ] } }, { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(6)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.0(2)A8(11)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(6)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 9000 Series Switches in Standalone NX-OS Mode", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(6)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 7000 and 7700 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(22)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.2(3)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(27) and 8.2(3). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(11) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9), 7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.2", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-77" } ] } ] }, "references": { "reference_data": [ { "name": "20190306 Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1613)", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1613" }, { "name": "107392", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107392" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-cmdinj-1613", "defect": [ [ "CSCvj63807", "CSCvj65654", "CSCvk50903", "CSCvk50906" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1613", "datePublished": "2019-03-11T22:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:42:56.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1601
Vulnerability from cvelistv5
Published
2019-03-08 18:00
Modified
2024-11-20 17:26
Severity ?
EPSS score ?
Summary
Cisco NX-OS Software Unauthorized Filesystem Access Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-file-access | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107404 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | MDS 9000 Series Multilayer Switches |
Version: unspecified < 6.2(25) Version: unspecified < 8.1(1b) Version: unspecified < 8.3(1) |
||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190306 Cisco NX-OS Software Unauthorized Filesystem Access Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-file-access" }, { "name": "107404", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107404" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1601", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:55:44.659510Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:26:44.729Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "MDS 9000 Series Multilayer Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(25)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.1(1b)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.3(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.0(2)A8(10)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 2000, 5500, 5600, and 6000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.1(5)N1(1b)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.3(3)N1(1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 7000 and 7700 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(22)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.3(3)D1(1)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.2(3)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches-Standalone", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I4(9)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, local attacker to gain read and write access to a critical configuration file. The vulnerability is due to a failure to impose strict filesystem permissions on the targeted device. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow an attacker to use the content of this configuration file to bypass authentication and log in as any user of the device. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-15T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190306 Cisco NX-OS Software Unauthorized Filesystem Access Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-file-access" }, { "name": "107404", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107404" } ], "source": { "advisory": "cisco-sa-20190306-nxos-file-access", "defect": [ [ "CSCvi42317", "CSCvi42331", "CSCvi96476", "CSCvi96478", "CSCvi96486" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software Unauthorized Filesystem Access Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1601", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software Unauthorized Filesystem Access Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MDS 9000 Series Multilayer Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(25)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.1(1b)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.3(1)" } ] } }, { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.0(2)A8(10)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 2000, 5500, 5600, and 6000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.1(5)N1(1b)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.3(3)N1(1)" } ] } }, { "product_name": "Nexus 7000 and 7700 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(22)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.3(3)D1(1)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.2(3)" } ] } }, { "product_name": "Nexus 9000 Series Switches-Standalone", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I4(9)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the filesystem permissions of Cisco NX-OS Software could allow an authenticated, local attacker to gain read and write access to a critical configuration file. The vulnerability is due to a failure to impose strict filesystem permissions on the targeted device. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow an attacker to use the content of this configuration file to bypass authentication and log in as any user of the device. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.8", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "20190306 Cisco NX-OS Software Unauthorized Filesystem Access Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-file-access" }, { "name": "107404", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107404" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-file-access", "defect": [ [ "CSCvi42317", "CSCvi42331", "CSCvi96476", "CSCvi96478", "CSCvi96486" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1601", "datePublished": "2019-03-08T18:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:26:44.729Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1604
Vulnerability from cvelistv5
Published
2019-03-08 19:00
Modified
2024-11-20 17:26
Severity ?
EPSS score ?
Summary
Cisco NX-OS Software Privilege Escalation Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesca | vendor-advisory, x_refsource_CISCO | |
http://www.securityfocus.com/bid/107323 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Nexus 7000 and 7700 Series Switches |
Version: unspecified < 6.2(22) Version: unspecified < 8.2(3) Version: unspecified < 8.3(2) |
||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.341Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesca" }, { "name": "107323", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107323" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1604", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-20T16:55:39.911374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T17:26:14.554Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Nexus 7000 and 7700 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "6.2(22)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.2(3)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "8.3(2)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3000 Series Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3500 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 3600 Platform Switches", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9000 Series Switches-Standalone", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)I7(4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Nexus 9500 R-Series Line Cards and Fabric Modules", "vendor": "Cisco", "versions": [ { "lessThan": "7.0(3)F3(5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the user account management interface of Cisco NX-OS Software could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to an incorrect authorization check of user accounts and their associated Group ID (GID). An attacker could exploit this vulnerability by taking advantage of a logic error that will permit the use of higher privileged commands than what is necessarily assigned. A successful exploit could allow an attacker to execute commands with elevated privileges on the underlying Linux shell of an affected device. Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 8.2(3), and 8.3(2). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-09T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesca" }, { "name": "107323", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107323" } ], "source": { "advisory": "cisco-sa-20190306-nxos-privesca", "defect": [ [ "CSCvi53896", "CSCvk70990", "CSCvm35213", "CSCvm35215" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software Privilege Escalation Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-03-06T16:00:00-0800", "ID": "CVE-2019-1604", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software Privilege Escalation Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Nexus 7000 and 7700 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2(22)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.2(3)" }, { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.3(2)" } ] } }, { "product_name": "Nexus 3000 Series Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3500 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 3600 Platform Switches", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } }, { "product_name": "Nexus 9000 Series Switches-Standalone", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)I7(4)" } ] } }, { "product_name": "Nexus 9500 R-Series Line Cards and Fabric Modules", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "7.0(3)F3(5)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the user account management interface of Cisco NX-OS Software could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to an incorrect authorization check of user accounts and their associated Group ID (GID). An attacker could exploit this vulnerability by taking advantage of a logic error that will permit the use of higher privileged commands than what is necessarily assigned. A successful exploit could allow an attacker to execute commands with elevated privileges on the underlying Linux shell of an affected device. Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 8.2(3), and 8.3(2). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.3", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285" } ] } ] }, "references": { "reference_data": [ { "name": "20190306 Cisco NX-OS Software Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-privesca" }, { "name": "107323", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107323" } ] }, "source": { "advisory": "cisco-sa-20190306-nxos-privesca", "defect": [ [ "CSCvi53896", "CSCvk70990", "CSCvm35213", "CSCvm35215" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1604", "datePublished": "2019-03-08T19:00:00Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-20T17:26:14.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }