Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2024-1491
Vulnerability from csaf_certbund - Published: 2024-07-01 22:00 - Updated: 2024-07-01 22:00Summary
Cisco NX-OS: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Cisco NX-OS ist ein Data Center Netzwerk-Betriebssystem für virtualisierte Rechenzentren. NX-OS wurde für Ethernet Switches der Nexus Serie und Fibre Channel Storage Area Network Swiches der MDS Serie entwickelt.
Angriff: Ein lokaler Angreifer kann eine Schwachstelle in Cisco NX-OS ausnutzen, um beliebigen Programmcode mit root Rechten auszuführen.
Betroffene Betriebssysteme: - Sonstiges
Es besteht eine Schwachstelle in Cisco NX-OS. Dieser Fehler besteht aufgrund einer unzureichenden Validierung von Argumenten, die an bestimmte Konfigurations-CLI-Befehle übergeben werden. Durch das Einfügen von manipulierten Eingaben als Argument in CLI kann ein lokaler Angreifer diese Schwachstelle ausnutzen, um beliebige Befehle als root auszuführen.
References
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Cisco NX-OS ist ein Data Center Netzwerk-Betriebssystem f\u00fcr virtualisierte Rechenzentren. NX-OS wurde f\u00fcr Ethernet Switches der Nexus Serie und Fibre Channel Storage Area Network Swiches der MDS Serie entwickelt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in Cisco NX-OS ausnutzen, um beliebigen Programmcode mit root Rechten auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1491 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1491.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1491 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1491"
},
{
"category": "external",
"summary": "Cisco Security Bulletin vom 2024-07-01",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP"
}
],
"source_lang": "en-US",
"title": "Cisco NX-OS: Schwachstelle erm\u00f6glicht Ausf\u00fchren von beliebigem Programmcode",
"tracking": {
"current_release_date": "2024-07-01T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:10:46.362+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-1491",
"initial_release_date": "2024-07-01T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-01T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Cisco NX-OS",
"product": {
"name": "Cisco NX-OS",
"product_id": "T035723",
"product_identification_helper": {
"cpe": "cpe:/o:cisco:nx-os:-"
}
}
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-20399",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in Cisco NX-OS. Dieser Fehler besteht aufgrund einer unzureichenden Validierung von Argumenten, die an bestimmte Konfigurations-CLI-Befehle \u00fcbergeben werden. Durch das Einf\u00fcgen von manipulierten Eingaben als Argument in CLI kann ein lokaler Angreifer diese Schwachstelle ausnutzen, um beliebige Befehle als root auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T035723"
]
},
"release_date": "2024-07-01T22:00:00.000+00:00",
"title": "CVE-2024-20399"
}
]
}
CVE-2024-20399 (GCVE-0-2024-20399)
Vulnerability from cvelistv5 – Published: 2024-07-01 16:11 – Updated: 2025-10-21 18:43
VLAI?
EPSS
Title
Cisco NX-OS Software CLI Command Injection Vulnerability
Summary
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.
Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges:
Nexus 3000 Series Switches
Nexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later
Nexus 9000 Series Switches in standalone NX-OS mode
Severity ?
6 (Medium)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco NX-OS Software |
Affected:
8.2(5)
Affected: 7.3(6)N1(1a) Affected: 7.3(5)D1(1) Affected: 8.4(2) Affected: 7.3(6)N1(1) Affected: 6.2(2) Affected: 8.4(3) Affected: 9.2(3) Affected: 7.0(3)I5(2) Affected: 8.2(1) Affected: 6.0(2)A8(7a) Affected: 7.0(3)I4(5) Affected: 6.0(2)A6(1) Affected: 7.3(1)D1(1) Affected: 6.2(14a) Affected: 7.0(3)I4(6) Affected: 7.3(4)N1(1) Affected: 7.0(3)I4(3) Affected: 9.2(2v) Affected: 6.0(2)A6(5b) Affected: 7.3(0)D1(1) Affected: 6.2(17a) Affected: 7.0(3)I4(7) Affected: 6.0(2)U6(1a) Affected: 7.1(5)N1(1b) Affected: 7.0(3)I4(1) Affected: 7.0(3)I4(8) Affected: 7.0(3)I4(2) Affected: 7.1(4)N1(1c) Affected: 7.0(3)IM3(1) Affected: 6.0(2)U6(5a) Affected: 6.0(2)A8(11) Affected: 6.0(2)A6(4a) Affected: 6.2(9) Affected: 6.2(5) Affected: 7.3(4)D1(1) Affected: 6.2(20) Affected: 9.2(1) Affected: 9.2(2t) Affected: 9.2(3y) Affected: 7.0(3)I4(1t) Affected: 6.0(2)U6(5c) Affected: 6.0(2)A6(4) Affected: 7.0(3)I7(6z) Affected: 9.3(2) Affected: 7.3(1)DY(1) Affected: 7.0(3)F3(3) Affected: 6.0(2)U6(6) Affected: 6.2(29) Affected: 7.0(3)I7(3z) Affected: 7.0(3)IM7(2) Affected: 6.0(2)A8(11b) Affected: 6.2(9a) Affected: 7.3(0)N1(1) Affected: 7.0(3)I7(5a) Affected: 6.2(11d) Affected: 8.1(1) Affected: 7.0(3)I6(1) Affected: 6.0(2)U6(10) Affected: 7.2(2)D1(2) Affected: 7.0(3)IM3(2) Affected: 6.0(2)A6(8) Affected: 8.2(2) Affected: 6.0(2)U6(1) Affected: 7.3(2)N1(1c) Affected: 7.0(3)I5(3b) Affected: 8.3(2) Affected: 7.3(5)N1(1) Affected: 6.0(2)A6(2a) Affected: 7.3(2)N1(1b) Affected: 6.2(27) Affected: 7.3(2)D1(3a) Affected: 7.3(1)N1(1) Affected: 6.0(2)U6(7) Affected: 9.2(4) Affected: 7.1(4)N1(1a) Affected: 7.1(3)N1(4) Affected: 7.0(3)IM3(2a) Affected: 6.2(8b) Affected: 6.0(2)A8(10) Affected: 7.1(3)N1(2) Affected: 6.2(13) Affected: 6.0(2)A8(2) Affected: 7.0(3)IC4(4) Affected: 6.2(1) Affected: 7.3(4)N1(1a) Affected: 8.1(2) Affected: 6.0(2)A6(3) Affected: 6.0(2)U6(5b) Affected: 7.0(3)F3(3c) Affected: 7.3(3)D1(1) Affected: 7.0(3)F3(1) Affected: 6.0(2)U6(5) Affected: 7.0(3)F3(5) Affected: 7.1(2)N1(1) Affected: 7.1(3)N1(3) Affected: 8.2(3) Affected: 6.0(2)A6(7) Affected: 7.0(3)I7(2) Affected: 6.2(5a) Affected: 6.2(18) Affected: 6.0(2)A6(5) Affected: 7.0(3)IM3(2b) Affected: 7.1(3)N1(1) Affected: 6.0(2)U6(4a) Affected: 7.0(3)I5(3) Affected: 7.0(3)I7(3) Affected: 6.0(2)A8(6) Affected: 7.0(3)I6(2) Affected: 8.3(1) Affected: 6.2(3) Affected: 6.2(22) Affected: 7.1(1)N1(1) Affected: 8.4(1) Affected: 8.1(1b) Affected: 7.3(0)N1(1b) Affected: 7.2(2)D1(4) Affected: 6.0(2)A8(5) Affected: 7.3(0)DX(1) Affected: 7.1(4)N1(1d) Affected: 7.3(2)D1(1) Affected: 7.3(2)N1(1) Affected: 6.0(2)U6(8) Affected: 7.1(1)N1(1a) Affected: 7.0(3)IM3(3) Affected: 9.3(1) Affected: 6.0(2)U6(2) Affected: 6.2(9b) Affected: 7.1(3)N1(2a) Affected: 7.3(0)N1(1a) Affected: 6.0(2)A8(7) Affected: 7.0(3)I7(6) Affected: 7.3(2)D1(2) Affected: 6.2(25) Affected: 6.0(2)U6(3a) Affected: 8.0(1) Affected: 6.0(2)A8(11a) Affected: 6.2(11e) Affected: 7.1(3)N1(5) Affected: 7.0(3)I4(8z) Affected: 6.2(11) Affected: 7.0(3)I4(9) Affected: 6.2(16) Affected: 6.2(19) Affected: 8.2(4) Affected: 6.2(2a) Affected: 7.2(2)D1(3) Affected: 7.1(0)N1(1b) Affected: 7.0(3)I7(4) Affected: 7.0(3)I7(7) Affected: 6.2(5b) Affected: 7.3(0)DY(1) Affected: 6.0(2)A8(9) Affected: 6.0(2)A8(1) Affected: 7.1(5)N1(1) Affected: 7.2(1)D1(1) Affected: 6.2(15) Affected: 6.0(2)A6(6) Affected: 6.0(2)A8(10a) Affected: 7.0(3)I5(1) Affected: 9.3(1z) Affected: 9.2(2) Affected: 6.2(7) Affected: 6.2(9c) Affected: 7.0(3)F3(4) Affected: 7.3(3)N1(1) Affected: 6.2(6b) Affected: 7.0(3)I4(8b) Affected: 8.1(2a) Affected: 7.3(2)D1(3) Affected: 6.2(8) Affected: 6.0(2)A8(3) Affected: 6.2(11b) Affected: 7.0(3)I4(6t) Affected: 7.0(3)I5(3a) Affected: 8.1(1a) Affected: 6.2(13a) Affected: 6.0(2)A8(8) Affected: 7.0(3)I7(5) Affected: 7.0(3)F3(3a) Affected: 7.1(0)N1(1a) Affected: 6.0(2)A8(4) Affected: 6.0(2)A6(3a) Affected: 6.0(2)A6(5a) Affected: 7.0(3)F2(1) Affected: 7.0(3)I4(8a) Affected: 6.0(2)U6(9) Affected: 7.0(3)F3(2) Affected: 6.0(2)U6(2a) Affected: 6.2(12) Affected: 6.2(17) Affected: 7.0(3)I4(4) Affected: 6.2(23) Affected: 6.2(13b) Affected: 6.0(2)U6(3) Affected: 6.2(10) Affected: 6.2(6a) Affected: 6.2(6) Affected: 7.1(2)N1(1a) Affected: 6.2(14) Affected: 7.0(3)I7(1) Affected: 6.2(14b) Affected: 6.2(21) Affected: 7.2(2)D1(1) Affected: 7.0(3)F2(2) Affected: 7.0(3)IA7(2) Affected: 7.0(3)IA7(1) Affected: 6.0(2)A8(7b) Affected: 6.2(8a) Affected: 6.2(11c) Affected: 7.0(3)F1(1) Affected: 6.0(2)A6(1a) Affected: 7.1(0)N1(1) Affected: 7.2(0)D1(1) Affected: 6.0(2)A6(2) Affected: 7.1(4)N1(1) Affected: 6.0(2)A8(4a) Affected: 6.2(20a) Affected: 6.0(2)U6(4) Affected: 8.4(1a) Affected: 9.3(3) Affected: 7.3(2)D1(1d) Affected: 7.3(7)N1(1) Affected: 6.2(24) Affected: 6.2(31) Affected: 7.0(3)I7(8) Affected: 6.0(2)U6(10a) Affected: 7.3(7)N1(1a) Affected: 9.3(4) Affected: 7.3(6)D1(1) Affected: 6.2(26) Affected: 8.2(6) Affected: 6.2(33) Affected: 9.3(5) Affected: 8.4(2a) Affected: 8.4(2b) Affected: 7.3(8)N1(1) Affected: 7.0(3)I7(9) Affected: 7.3(7)N1(1b) Affected: 6.2(24a) Affected: 8.5(1) Affected: 9.3(6) Affected: 10.1(2) Affected: 10.1(1) Affected: 8.4(4) Affected: 7.3(7)D1(1) Affected: 8.4(2c) Affected: 9.3(5w) Affected: 8.2(7) Affected: 7.3(9)N1(1) Affected: 9.3(7) Affected: 9.3(7k) Affected: 7.0(3)I7(9w) Affected: 10.2(1) Affected: 7.3(8)N1(1a) Affected: 7.3(8)D1(1) Affected: 9.3(7a) Affected: 8.2(7a) Affected: 9.3(8) Affected: 8.4(4a) Affected: 8.4(2d) Affected: 7.3(10)N1(1) Affected: 8.4(5) Affected: 7.0(3)I7(10) Affected: 7.3(8)N1(1b) Affected: 8.2(8) Affected: 10.2(1q) Affected: 10.2(2) Affected: 9.3(9) Affected: 7.3(9)D1(1) Affected: 7.3(11)N1(1) Affected: 10.2(3) Affected: 8.4(6) Affected: 8.4(2e) Affected: 9.3(10) Affected: 7.3(11)N1(1a) Affected: 10.2(2a) Affected: 7.3(12)N1(1) Affected: 9.2(1a) Affected: 8.2(9) Affected: 10.3(1) Affected: 10.2(4) Affected: 7.3(13)N1(1) Affected: 8.4(7) Affected: 10.3(2) Affected: 8.4(6a) Affected: 9.3(11) Affected: 10.3(3) Affected: 10.2(5) Affected: 9.4(1) Affected: 9.3(2a) Affected: 8.4(2f) Affected: 8.2(10) Affected: 9.3(12) Affected: 10.4(1) Affected: 8.4(8) Affected: 10.3(99w) Affected: 7.3(14)N1(1) Affected: 10.2(6) Affected: 10.3(3w) Affected: 10.3(99x) Affected: 10.3(3o) Affected: 8.4(9) Affected: 10.3(4) Affected: 10.3(3p) Affected: 10.3(4a) Affected: 9.4(1a) Affected: 10.4(2) Affected: 10.3(3q) Affected: 9.3(13) Affected: 8.2(11) Affected: 9.4(2) Affected: 10.3(5) Affected: 10.2(7) Affected: 10.3(3x) Affected: 10.3(4g) Affected: 10.2(8) Affected: 10.3(3r) |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(3a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(5a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(5b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(7a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(7b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(10a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(11a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(11b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(3a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(5a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(5b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(5c\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(6b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(8a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(8b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(18\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(16\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(14\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(6a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(20\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(5b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(9a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(9b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(13a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(13b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(17\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(20a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(22\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(27\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(29\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(24\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(24a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(33\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(3a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(3c\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(8a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(8b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(8z\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I5\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I6\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(5a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(0\\)N1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(0\\)N1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(0\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(1\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(2\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)N1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(4\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(5\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.1\\(5\\)N1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(0\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(1\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(2\\)D1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.2\\(2\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)DX\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(1\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(1\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)D1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)D1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)D1\\(3a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(3\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(7a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.2\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(2t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(2v\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(4\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(3\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(4\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(5\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(2b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(2c\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(6a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(2f\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.4\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(7a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(12\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(13\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(6\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(5\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(7\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(7\\)N1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(7\\)N1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(6\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(8\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(7\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(9\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:8.5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(10\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(8\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.2\\(1q\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.2\\(3t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(9\\)D1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(11\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(12\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.3\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.3\\(99w\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.3\\(99x\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.3\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(13\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:7.3\\(14\\)N1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.4\\(2\\):*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "nx-os",
"vendor": "cisco",
"versions": [
{
"status": "affected",
"version": "6.0\\(2\\)a6\\(1\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A6\\(1a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A6\\(2\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A6\\(2a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A6\\(3\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A6\\(3a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A6\\(4\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A6\\(4a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A6\\(5a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A6\\(5b\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A6\\(6\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A6\\(7\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A6\\(8\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(1\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(2\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(3\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(4\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(4a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(5\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(6\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(7\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(7a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(7b\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(8\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(9\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(10a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(10\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(11\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(11a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)A8\\(11b\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(1\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(2\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(3\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(4\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(5\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(6\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(7\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(8\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(1a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(2a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(3a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(4a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(5a\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(5b\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(5c\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(9\\)"
},
{
"status": "affected",
"version": "6.0\\(2\\)U6\\(10\\)"
},
{
"status": "affected",
"version": "6.2\\(2\\)"
},
{
"status": "affected",
"version": "6.2\\(2a\\)"
},
{
"status": "affected",
"version": "6.2\\(6\\)"
},
{
"status": "affected",
"version": "6.2\\(6b\\)"
},
{
"status": "affected",
"version": "6.2\\(8\\)"
},
{
"status": "affected",
"version": "6.2\\(8a\\)"
},
{
"status": "affected",
"version": "6.2\\(8b\\)"
},
{
"status": "affected",
"version": "6.2\\(10\\)"
},
{
"status": "affected",
"version": "6.2\\(12\\)"
},
{
"status": "affected",
"version": "6.2\\(18\\)"
},
{
"status": "affected",
"version": "6.2\\(16\\)"
},
{
"status": "affected",
"version": "6.2\\(14\\)"
},
{
"status": "affected",
"version": "6.2\\(6a\\)"
},
{
"status": "affected",
"version": "6.2\\(20\\)"
},
{
"status": "affected",
"version": "6.2\\(1\\)"
},
{
"status": "affected",
"version": "6.2\\(5b\\)"
},
{
"status": "affected",
"version": "6.2\\(9\\)"
},
{
"status": "affected",
"version": "6.2\\(9a\\)"
},
{
"status": "affected",
"version": "6.2\\(9b\\)"
},
{
"status": "affected",
"version": "6.2\\(11\\)"
},
{
"status": "affected",
"version": "6.2\\(13a\\)"
},
{
"status": "affected",
"version": "6.2\\(13b\\)"
},
{
"status": "affected",
"version": "6.2\\(17\\)"
},
{
"status": "affected",
"version": "6.2\\(20a\\)"
},
{
"status": "affected",
"version": "6.2\\(22\\)"
},
{
"status": "affected",
"version": "6.2\\(27\\)"
},
{
"status": "affected",
"version": "6.2\\(29\\)"
},
{
"status": "affected",
"version": "6.2\\(24\\)"
},
{
"status": "affected",
"version": "6.2\\(24a\\)"
},
{
"status": "affected",
"version": "6.2\\(33\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)F1\\(1\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)F2\\(1\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)F2\\(2\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)F3\\(1\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)F3\\(3\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)F3\\(3a\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)F3\\(4\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)F3\\(3c\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)F3\\(5\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I4\\(1\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I4\\(2\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I4\\(3\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I4\\(4\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I4\\(5\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I4\\(6\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I4\\(7\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I4\\(8\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I4\\(8a\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I4\\(8b\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I4\\(8z\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I4\\(9\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I5\\(1\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I5\\(2\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I6\\(1\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I6\\(2\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I7\\(1\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I7\\(2\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I7\\(3\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I7\\(4\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I7\\(5\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I7\\(5a\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I7\\(6\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I7\\(7\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I7\\(8\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I7\\(9\\)"
},
{
"status": "affected",
"version": "7.0\\(3\\)I7\\(10\\)"
},
{
"status": "affected",
"version": "7.1\\(0\\)N1\\(1a\\)"
},
{
"status": "affected",
"version": "7.1\\(0\\)N1\\(1b\\)"
},
{
"status": "affected",
"version": "7.1\\(0\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.1\\(1\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.1\\(2\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.1\\(3\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.1\\(3\\)N1\\(2\\)"
},
{
"status": "affected",
"version": "7.1\\(4\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.1\\(5\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.1\\(5\\)N1\\(1b\\)"
},
{
"status": "affected",
"version": "7.2\\(0\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "7.2\\(1\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "7.2\\(2\\)D1\\(2\\)"
},
{
"status": "affected",
"version": "7.2\\(2\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(0\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(0\\)DX\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(0\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(1\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(1\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(2\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(2\\)D1\\(2\\)"
},
{
"status": "affected",
"version": "7.3\\(2\\)D1\\(3\\)"
},
{
"status": "affected",
"version": "7.3\\(2\\)D1\\(3a\\)"
},
{
"status": "affected",
"version": "7.3\\(2\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(3\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "8.0\\(1\\)"
},
{
"status": "affected",
"version": "8.1\\(1\\)"
},
{
"status": "affected",
"version": "8.1\\(2\\)"
},
{
"status": "affected",
"version": "8.1\\(2a\\)"
},
{
"status": "affected",
"version": "8.1\\(1b\\)"
},
{
"status": "affected",
"version": "8.2\\(1\\)"
},
{
"status": "affected",
"version": "8.2\\(2\\)"
},
{
"status": "affected",
"version": "8.2\\(3\\)"
},
{
"status": "affected",
"version": "8.2\\(4\\)"
},
{
"status": "affected",
"version": "8.2\\(5\\)"
},
{
"status": "affected",
"version": "8.2\\(6\\)"
},
{
"status": "affected",
"version": "8.2\\(7\\)"
},
{
"status": "affected",
"version": "8.2\\(7a\\)"
},
{
"status": "affected",
"version": "8.2\\(8\\)"
},
{
"status": "affected",
"version": "8.2\\(9\\)"
},
{
"status": "affected",
"version": "8.2\\(10\\)"
},
{
"status": "affected",
"version": "8.2\\(11\\)"
},
{
"status": "affected",
"version": "8.3\\(1\\)"
},
{
"status": "affected",
"version": "8.3\\(2\\)"
},
{
"status": "affected",
"version": "9.2\\(1\\)"
},
{
"status": "affected",
"version": "9.2\\(2\\)"
},
{
"status": "affected",
"version": "9.2\\(2t\\)"
},
{
"status": "affected",
"version": "9.2\\(3\\)"
},
{
"status": "affected",
"version": "9.2\\(4\\)"
},
{
"status": "affected",
"version": "9.2\\(2v\\)"
},
{
"status": "affected",
"version": "7.3\\(4\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(3\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(4\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(5\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "8.4\\(1\\)"
},
{
"status": "affected",
"version": "8.4\\(2\\)"
},
{
"status": "affected",
"version": "8.4\\(3\\)"
},
{
"status": "affected",
"version": "8.4\\(2b\\)"
},
{
"status": "affected",
"version": "8.4\\(4\\)"
},
{
"status": "affected",
"version": "8.4\\(2c\\)"
},
{
"status": "affected",
"version": "8.4\\(4a\\)"
},
{
"status": "affected",
"version": "8.4\\(5\\)"
},
{
"status": "affected",
"version": "8.4\\(6\\)"
},
{
"status": "affected",
"version": "8.4\\(6a\\)"
},
{
"status": "affected",
"version": "8.4\\(7\\)"
},
{
"status": "affected",
"version": "8.4\\(2f\\)"
},
{
"status": "affected",
"version": "8.4\\(8\\)"
},
{
"status": "affected",
"version": "8.4\\(9\\)"
},
{
"status": "affected",
"version": "9.3\\(1\\)"
},
{
"status": "affected",
"version": "9.3\\(2\\)"
},
{
"status": "affected",
"version": "9.3\\(3\\)"
},
{
"status": "affected",
"version": "9.3\\(4\\)"
},
{
"status": "affected",
"version": "9.3\\(5\\)"
},
{
"status": "affected",
"version": "9.3\\(6\\)"
},
{
"status": "affected",
"version": "9.3\\(7\\)"
},
{
"status": "affected",
"version": "9.3\\(7a\\)"
},
{
"status": "affected",
"version": "9.3\\(8\\)"
},
{
"status": "affected",
"version": "9.3\\(9\\)"
},
{
"status": "affected",
"version": "9.3\\(10\\)"
},
{
"status": "affected",
"version": "9.3\\(11\\)"
},
{
"status": "affected",
"version": "9.3\\(2a\\)"
},
{
"status": "affected",
"version": "9.3\\(12\\)"
},
{
"status": "affected",
"version": "9.3\\(13\\)"
},
{
"status": "affected",
"version": "7.3\\(6\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(5\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(7\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(7\\)N1\\(1a\\)"
},
{
"status": "affected",
"version": "7.3\\(7\\)N1\\(1b\\)"
},
{
"status": "affected",
"version": "7.3\\(6\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(8\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(7\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(9\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "10.1\\(1\\)"
},
{
"status": "affected",
"version": "8.5\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(10\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(8\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "10.2\\(1\\)"
},
{
"status": "affected",
"version": "10.2\\(1q\\)"
},
{
"status": "affected",
"version": "10.2\\(2\\)"
},
{
"status": "affected",
"version": "10.2\\(3\\)"
},
{
"status": "affected",
"version": "10.2\\(3t\\)"
},
{
"status": "affected",
"version": "7.3\\(9\\)D1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(11\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(12\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "10.3\\(1\\)"
},
{
"status": "affected",
"version": "10.3\\(3\\)"
},
{
"status": "affected",
"version": "10.3\\(99w\\)"
},
{
"status": "affected",
"version": "10.3\\(99x\\)"
},
{
"status": "affected",
"version": "10.3\\(4a\\)"
},
{
"status": "affected",
"version": "10.3\\(5\\)"
},
{
"status": "affected",
"version": "7.3\\(13\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "7.3\\(14\\)N1\\(1\\)"
},
{
"status": "affected",
"version": "10.4\\(1\\)"
},
{
"status": "affected",
"version": "10.4\\(2\\)"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-20399",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-02T15:08:04.278010Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2024-07-02",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-20399"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T18:43:58.429Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"name": "CISA KEV",
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-20399"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-07-02T00:00:00.000Z",
"value": "CVE-2024-20399 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:59:42.407Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-nxos-cmd-injection-xD9OhyOP",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.sygnia.co/threat-reports-and-advisories/china-nexus-threat-group-velvet-ant-exploits-cisco-0-day/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Cisco NX-OS Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "8.2(5)"
},
{
"status": "affected",
"version": "7.3(6)N1(1a)"
},
{
"status": "affected",
"version": "7.3(5)D1(1)"
},
{
"status": "affected",
"version": "8.4(2)"
},
{
"status": "affected",
"version": "7.3(6)N1(1)"
},
{
"status": "affected",
"version": "6.2(2)"
},
{
"status": "affected",
"version": "8.4(3)"
},
{
"status": "affected",
"version": "9.2(3)"
},
{
"status": "affected",
"version": "7.0(3)I5(2)"
},
{
"status": "affected",
"version": "8.2(1)"
},
{
"status": "affected",
"version": "6.0(2)A8(7a)"
},
{
"status": "affected",
"version": "7.0(3)I4(5)"
},
{
"status": "affected",
"version": "6.0(2)A6(1)"
},
{
"status": "affected",
"version": "7.3(1)D1(1)"
},
{
"status": "affected",
"version": "6.2(14a)"
},
{
"status": "affected",
"version": "7.0(3)I4(6)"
},
{
"status": "affected",
"version": "7.3(4)N1(1)"
},
{
"status": "affected",
"version": "7.0(3)I4(3)"
},
{
"status": "affected",
"version": "9.2(2v)"
},
{
"status": "affected",
"version": "6.0(2)A6(5b)"
},
{
"status": "affected",
"version": "7.3(0)D1(1)"
},
{
"status": "affected",
"version": "6.2(17a)"
},
{
"status": "affected",
"version": "7.0(3)I4(7)"
},
{
"status": "affected",
"version": "6.0(2)U6(1a)"
},
{
"status": "affected",
"version": "7.1(5)N1(1b)"
},
{
"status": "affected",
"version": "7.0(3)I4(1)"
},
{
"status": "affected",
"version": "7.0(3)I4(8)"
},
{
"status": "affected",
"version": "7.0(3)I4(2)"
},
{
"status": "affected",
"version": "7.1(4)N1(1c)"
},
{
"status": "affected",
"version": "7.0(3)IM3(1)"
},
{
"status": "affected",
"version": "6.0(2)U6(5a)"
},
{
"status": "affected",
"version": "6.0(2)A8(11)"
},
{
"status": "affected",
"version": "6.0(2)A6(4a)"
},
{
"status": "affected",
"version": "6.2(9)"
},
{
"status": "affected",
"version": "6.2(5)"
},
{
"status": "affected",
"version": "7.3(4)D1(1)"
},
{
"status": "affected",
"version": "6.2(20)"
},
{
"status": "affected",
"version": "9.2(1)"
},
{
"status": "affected",
"version": "9.2(2t)"
},
{
"status": "affected",
"version": "9.2(3y)"
},
{
"status": "affected",
"version": "7.0(3)I4(1t)"
},
{
"status": "affected",
"version": "6.0(2)U6(5c)"
},
{
"status": "affected",
"version": "6.0(2)A6(4)"
},
{
"status": "affected",
"version": "7.0(3)I7(6z)"
},
{
"status": "affected",
"version": "9.3(2)"
},
{
"status": "affected",
"version": "7.3(1)DY(1)"
},
{
"status": "affected",
"version": "7.0(3)F3(3)"
},
{
"status": "affected",
"version": "6.0(2)U6(6)"
},
{
"status": "affected",
"version": "6.2(29)"
},
{
"status": "affected",
"version": "7.0(3)I7(3z)"
},
{
"status": "affected",
"version": "7.0(3)IM7(2)"
},
{
"status": "affected",
"version": "6.0(2)A8(11b)"
},
{
"status": "affected",
"version": "6.2(9a)"
},
{
"status": "affected",
"version": "7.3(0)N1(1)"
},
{
"status": "affected",
"version": "7.0(3)I7(5a)"
},
{
"status": "affected",
"version": "6.2(11d)"
},
{
"status": "affected",
"version": "8.1(1)"
},
{
"status": "affected",
"version": "7.0(3)I6(1)"
},
{
"status": "affected",
"version": "6.0(2)U6(10)"
},
{
"status": "affected",
"version": "7.2(2)D1(2)"
},
{
"status": "affected",
"version": "7.0(3)IM3(2)"
},
{
"status": "affected",
"version": "6.0(2)A6(8)"
},
{
"status": "affected",
"version": "8.2(2)"
},
{
"status": "affected",
"version": "6.0(2)U6(1)"
},
{
"status": "affected",
"version": "7.3(2)N1(1c)"
},
{
"status": "affected",
"version": "7.0(3)I5(3b)"
},
{
"status": "affected",
"version": "8.3(2)"
},
{
"status": "affected",
"version": "7.3(5)N1(1)"
},
{
"status": "affected",
"version": "6.0(2)A6(2a)"
},
{
"status": "affected",
"version": "7.3(2)N1(1b)"
},
{
"status": "affected",
"version": "6.2(27)"
},
{
"status": "affected",
"version": "7.3(2)D1(3a)"
},
{
"status": "affected",
"version": "7.3(1)N1(1)"
},
{
"status": "affected",
"version": "6.0(2)U6(7)"
},
{
"status": "affected",
"version": "9.2(4)"
},
{
"status": "affected",
"version": "7.1(4)N1(1a)"
},
{
"status": "affected",
"version": "7.1(3)N1(4)"
},
{
"status": "affected",
"version": "7.0(3)IM3(2a)"
},
{
"status": "affected",
"version": "6.2(8b)"
},
{
"status": "affected",
"version": "6.0(2)A8(10)"
},
{
"status": "affected",
"version": "7.1(3)N1(2)"
},
{
"status": "affected",
"version": "6.2(13)"
},
{
"status": "affected",
"version": "6.0(2)A8(2)"
},
{
"status": "affected",
"version": "7.0(3)IC4(4)"
},
{
"status": "affected",
"version": "6.2(1)"
},
{
"status": "affected",
"version": "7.3(4)N1(1a)"
},
{
"status": "affected",
"version": "8.1(2)"
},
{
"status": "affected",
"version": "6.0(2)A6(3)"
},
{
"status": "affected",
"version": "6.0(2)U6(5b)"
},
{
"status": "affected",
"version": "7.0(3)F3(3c)"
},
{
"status": "affected",
"version": "7.3(3)D1(1)"
},
{
"status": "affected",
"version": "7.0(3)F3(1)"
},
{
"status": "affected",
"version": "6.0(2)U6(5)"
},
{
"status": "affected",
"version": "7.0(3)F3(5)"
},
{
"status": "affected",
"version": "7.1(2)N1(1)"
},
{
"status": "affected",
"version": "7.1(3)N1(3)"
},
{
"status": "affected",
"version": "8.2(3)"
},
{
"status": "affected",
"version": "6.0(2)A6(7)"
},
{
"status": "affected",
"version": "7.0(3)I7(2)"
},
{
"status": "affected",
"version": "6.2(5a)"
},
{
"status": "affected",
"version": "6.2(18)"
},
{
"status": "affected",
"version": "6.0(2)A6(5)"
},
{
"status": "affected",
"version": "7.0(3)IM3(2b)"
},
{
"status": "affected",
"version": "7.1(3)N1(1)"
},
{
"status": "affected",
"version": "6.0(2)U6(4a)"
},
{
"status": "affected",
"version": "7.0(3)I5(3)"
},
{
"status": "affected",
"version": "7.0(3)I7(3)"
},
{
"status": "affected",
"version": "6.0(2)A8(6)"
},
{
"status": "affected",
"version": "7.0(3)I6(2)"
},
{
"status": "affected",
"version": "8.3(1)"
},
{
"status": "affected",
"version": "6.2(3)"
},
{
"status": "affected",
"version": "6.2(22)"
},
{
"status": "affected",
"version": "7.1(1)N1(1)"
},
{
"status": "affected",
"version": "8.4(1)"
},
{
"status": "affected",
"version": "8.1(1b)"
},
{
"status": "affected",
"version": "7.3(0)N1(1b)"
},
{
"status": "affected",
"version": "7.2(2)D1(4)"
},
{
"status": "affected",
"version": "6.0(2)A8(5)"
},
{
"status": "affected",
"version": "7.3(0)DX(1)"
},
{
"status": "affected",
"version": "7.1(4)N1(1d)"
},
{
"status": "affected",
"version": "7.3(2)D1(1)"
},
{
"status": "affected",
"version": "7.3(2)N1(1)"
},
{
"status": "affected",
"version": "6.0(2)U6(8)"
},
{
"status": "affected",
"version": "7.1(1)N1(1a)"
},
{
"status": "affected",
"version": "7.0(3)IM3(3)"
},
{
"status": "affected",
"version": "9.3(1)"
},
{
"status": "affected",
"version": "6.0(2)U6(2)"
},
{
"status": "affected",
"version": "6.2(9b)"
},
{
"status": "affected",
"version": "7.1(3)N1(2a)"
},
{
"status": "affected",
"version": "7.3(0)N1(1a)"
},
{
"status": "affected",
"version": "6.0(2)A8(7)"
},
{
"status": "affected",
"version": "7.0(3)I7(6)"
},
{
"status": "affected",
"version": "7.3(2)D1(2)"
},
{
"status": "affected",
"version": "6.2(25)"
},
{
"status": "affected",
"version": "6.0(2)U6(3a)"
},
{
"status": "affected",
"version": "8.0(1)"
},
{
"status": "affected",
"version": "6.0(2)A8(11a)"
},
{
"status": "affected",
"version": "6.2(11e)"
},
{
"status": "affected",
"version": "7.1(3)N1(5)"
},
{
"status": "affected",
"version": "7.0(3)I4(8z)"
},
{
"status": "affected",
"version": "6.2(11)"
},
{
"status": "affected",
"version": "7.0(3)I4(9)"
},
{
"status": "affected",
"version": "6.2(16)"
},
{
"status": "affected",
"version": "6.2(19)"
},
{
"status": "affected",
"version": "8.2(4)"
},
{
"status": "affected",
"version": "6.2(2a)"
},
{
"status": "affected",
"version": "7.2(2)D1(3)"
},
{
"status": "affected",
"version": "7.1(0)N1(1b)"
},
{
"status": "affected",
"version": "7.0(3)I7(4)"
},
{
"status": "affected",
"version": "7.0(3)I7(7)"
},
{
"status": "affected",
"version": "6.2(5b)"
},
{
"status": "affected",
"version": "7.3(0)DY(1)"
},
{
"status": "affected",
"version": "6.0(2)A8(9)"
},
{
"status": "affected",
"version": "6.0(2)A8(1)"
},
{
"status": "affected",
"version": "7.1(5)N1(1)"
},
{
"status": "affected",
"version": "7.2(1)D1(1)"
},
{
"status": "affected",
"version": "6.2(15)"
},
{
"status": "affected",
"version": "6.0(2)A6(6)"
},
{
"status": "affected",
"version": "6.0(2)A8(10a)"
},
{
"status": "affected",
"version": "7.0(3)I5(1)"
},
{
"status": "affected",
"version": "9.3(1z)"
},
{
"status": "affected",
"version": "9.2(2)"
},
{
"status": "affected",
"version": "6.2(7)"
},
{
"status": "affected",
"version": "6.2(9c)"
},
{
"status": "affected",
"version": "7.0(3)F3(4)"
},
{
"status": "affected",
"version": "7.3(3)N1(1)"
},
{
"status": "affected",
"version": "6.2(6b)"
},
{
"status": "affected",
"version": "7.0(3)I4(8b)"
},
{
"status": "affected",
"version": "8.1(2a)"
},
{
"status": "affected",
"version": "7.3(2)D1(3)"
},
{
"status": "affected",
"version": "6.2(8)"
},
{
"status": "affected",
"version": "6.0(2)A8(3)"
},
{
"status": "affected",
"version": "6.2(11b)"
},
{
"status": "affected",
"version": "7.0(3)I4(6t)"
},
{
"status": "affected",
"version": "7.0(3)I5(3a)"
},
{
"status": "affected",
"version": "8.1(1a)"
},
{
"status": "affected",
"version": "6.2(13a)"
},
{
"status": "affected",
"version": "6.0(2)A8(8)"
},
{
"status": "affected",
"version": "7.0(3)I7(5)"
},
{
"status": "affected",
"version": "7.0(3)F3(3a)"
},
{
"status": "affected",
"version": "7.1(0)N1(1a)"
},
{
"status": "affected",
"version": "6.0(2)A8(4)"
},
{
"status": "affected",
"version": "6.0(2)A6(3a)"
},
{
"status": "affected",
"version": "6.0(2)A6(5a)"
},
{
"status": "affected",
"version": "7.0(3)F2(1)"
},
{
"status": "affected",
"version": "7.0(3)I4(8a)"
},
{
"status": "affected",
"version": "6.0(2)U6(9)"
},
{
"status": "affected",
"version": "7.0(3)F3(2)"
},
{
"status": "affected",
"version": "6.0(2)U6(2a)"
},
{
"status": "affected",
"version": "6.2(12)"
},
{
"status": "affected",
"version": "6.2(17)"
},
{
"status": "affected",
"version": "7.0(3)I4(4)"
},
{
"status": "affected",
"version": "6.2(23)"
},
{
"status": "affected",
"version": "6.2(13b)"
},
{
"status": "affected",
"version": "6.0(2)U6(3)"
},
{
"status": "affected",
"version": "6.2(10)"
},
{
"status": "affected",
"version": "6.2(6a)"
},
{
"status": "affected",
"version": "6.2(6)"
},
{
"status": "affected",
"version": "7.1(2)N1(1a)"
},
{
"status": "affected",
"version": "6.2(14)"
},
{
"status": "affected",
"version": "7.0(3)I7(1)"
},
{
"status": "affected",
"version": "6.2(14b)"
},
{
"status": "affected",
"version": "6.2(21)"
},
{
"status": "affected",
"version": "7.2(2)D1(1)"
},
{
"status": "affected",
"version": "7.0(3)F2(2)"
},
{
"status": "affected",
"version": "7.0(3)IA7(2)"
},
{
"status": "affected",
"version": "7.0(3)IA7(1)"
},
{
"status": "affected",
"version": "6.0(2)A8(7b)"
},
{
"status": "affected",
"version": "6.2(8a)"
},
{
"status": "affected",
"version": "6.2(11c)"
},
{
"status": "affected",
"version": "7.0(3)F1(1)"
},
{
"status": "affected",
"version": "6.0(2)A6(1a)"
},
{
"status": "affected",
"version": "7.1(0)N1(1)"
},
{
"status": "affected",
"version": "7.2(0)D1(1)"
},
{
"status": "affected",
"version": "6.0(2)A6(2)"
},
{
"status": "affected",
"version": "7.1(4)N1(1)"
},
{
"status": "affected",
"version": "6.0(2)A8(4a)"
},
{
"status": "affected",
"version": "6.2(20a)"
},
{
"status": "affected",
"version": "6.0(2)U6(4)"
},
{
"status": "affected",
"version": "8.4(1a)"
},
{
"status": "affected",
"version": "9.3(3)"
},
{
"status": "affected",
"version": "7.3(2)D1(1d)"
},
{
"status": "affected",
"version": "7.3(7)N1(1)"
},
{
"status": "affected",
"version": "6.2(24)"
},
{
"status": "affected",
"version": "6.2(31)"
},
{
"status": "affected",
"version": "7.0(3)I7(8)"
},
{
"status": "affected",
"version": "6.0(2)U6(10a)"
},
{
"status": "affected",
"version": "7.3(7)N1(1a)"
},
{
"status": "affected",
"version": "9.3(4)"
},
{
"status": "affected",
"version": "7.3(6)D1(1)"
},
{
"status": "affected",
"version": "6.2(26)"
},
{
"status": "affected",
"version": "8.2(6)"
},
{
"status": "affected",
"version": "6.2(33)"
},
{
"status": "affected",
"version": "9.3(5)"
},
{
"status": "affected",
"version": "8.4(2a)"
},
{
"status": "affected",
"version": "8.4(2b)"
},
{
"status": "affected",
"version": "7.3(8)N1(1)"
},
{
"status": "affected",
"version": "7.0(3)I7(9)"
},
{
"status": "affected",
"version": "7.3(7)N1(1b)"
},
{
"status": "affected",
"version": "6.2(24a)"
},
{
"status": "affected",
"version": "8.5(1)"
},
{
"status": "affected",
"version": "9.3(6)"
},
{
"status": "affected",
"version": "10.1(2)"
},
{
"status": "affected",
"version": "10.1(1)"
},
{
"status": "affected",
"version": "8.4(4)"
},
{
"status": "affected",
"version": "7.3(7)D1(1)"
},
{
"status": "affected",
"version": "8.4(2c)"
},
{
"status": "affected",
"version": "9.3(5w)"
},
{
"status": "affected",
"version": "8.2(7)"
},
{
"status": "affected",
"version": "7.3(9)N1(1)"
},
{
"status": "affected",
"version": "9.3(7)"
},
{
"status": "affected",
"version": "9.3(7k)"
},
{
"status": "affected",
"version": "7.0(3)I7(9w)"
},
{
"status": "affected",
"version": "10.2(1)"
},
{
"status": "affected",
"version": "7.3(8)N1(1a)"
},
{
"status": "affected",
"version": "7.3(8)D1(1)"
},
{
"status": "affected",
"version": "9.3(7a)"
},
{
"status": "affected",
"version": "8.2(7a)"
},
{
"status": "affected",
"version": "9.3(8)"
},
{
"status": "affected",
"version": "8.4(4a)"
},
{
"status": "affected",
"version": "8.4(2d)"
},
{
"status": "affected",
"version": "7.3(10)N1(1)"
},
{
"status": "affected",
"version": "8.4(5)"
},
{
"status": "affected",
"version": "7.0(3)I7(10)"
},
{
"status": "affected",
"version": "7.3(8)N1(1b)"
},
{
"status": "affected",
"version": "8.2(8)"
},
{
"status": "affected",
"version": "10.2(1q)"
},
{
"status": "affected",
"version": "10.2(2)"
},
{
"status": "affected",
"version": "9.3(9)"
},
{
"status": "affected",
"version": "7.3(9)D1(1)"
},
{
"status": "affected",
"version": "7.3(11)N1(1)"
},
{
"status": "affected",
"version": "10.2(3)"
},
{
"status": "affected",
"version": "8.4(6)"
},
{
"status": "affected",
"version": "8.4(2e)"
},
{
"status": "affected",
"version": "9.3(10)"
},
{
"status": "affected",
"version": "7.3(11)N1(1a)"
},
{
"status": "affected",
"version": "10.2(2a)"
},
{
"status": "affected",
"version": "7.3(12)N1(1)"
},
{
"status": "affected",
"version": "9.2(1a)"
},
{
"status": "affected",
"version": "8.2(9)"
},
{
"status": "affected",
"version": "10.3(1)"
},
{
"status": "affected",
"version": "10.2(4)"
},
{
"status": "affected",
"version": "7.3(13)N1(1)"
},
{
"status": "affected",
"version": "8.4(7)"
},
{
"status": "affected",
"version": "10.3(2)"
},
{
"status": "affected",
"version": "8.4(6a)"
},
{
"status": "affected",
"version": "9.3(11)"
},
{
"status": "affected",
"version": "10.3(3)"
},
{
"status": "affected",
"version": "10.2(5)"
},
{
"status": "affected",
"version": "9.4(1)"
},
{
"status": "affected",
"version": "9.3(2a)"
},
{
"status": "affected",
"version": "8.4(2f)"
},
{
"status": "affected",
"version": "8.2(10)"
},
{
"status": "affected",
"version": "9.3(12)"
},
{
"status": "affected",
"version": "10.4(1)"
},
{
"status": "affected",
"version": "8.4(8)"
},
{
"status": "affected",
"version": "10.3(99w)"
},
{
"status": "affected",
"version": "7.3(14)N1(1)"
},
{
"status": "affected",
"version": "10.2(6)"
},
{
"status": "affected",
"version": "10.3(3w)"
},
{
"status": "affected",
"version": "10.3(99x)"
},
{
"status": "affected",
"version": "10.3(3o)"
},
{
"status": "affected",
"version": "8.4(9)"
},
{
"status": "affected",
"version": "10.3(4)"
},
{
"status": "affected",
"version": "10.3(3p)"
},
{
"status": "affected",
"version": "10.3(4a)"
},
{
"status": "affected",
"version": "9.4(1a)"
},
{
"status": "affected",
"version": "10.4(2)"
},
{
"status": "affected",
"version": "10.3(3q)"
},
{
"status": "affected",
"version": "9.3(13)"
},
{
"status": "affected",
"version": "8.2(11)"
},
{
"status": "affected",
"version": "9.4(2)"
},
{
"status": "affected",
"version": "10.3(5)"
},
{
"status": "affected",
"version": "10.2(7)"
},
{
"status": "affected",
"version": "10.3(3x)"
},
{
"status": "affected",
"version": "10.3(4g)"
},
{
"status": "affected",
"version": "10.2(8)"
},
{
"status": "affected",
"version": "10.3(3r)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.\r\nNote: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges:\r\n\r\nNexus 3000 Series Switches\r\nNexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later\r\nNexus 9000 Series Switches in standalone NX-OS mode"
}
],
"exploits": [
{
"lang": "en",
"value": "In May 2024, the Cisco Product Security Incident Response Team (PSIRT) became aware of attempted exploitation of this vulnerability in the wild."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-17T18:07:44.853Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-nxos-cmd-injection-xD9OhyOP",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP"
}
],
"source": {
"advisory": "cisco-sa-nxos-cmd-injection-xD9OhyOP",
"defects": [
"CSCwj94682"
],
"discovery": "EXTERNAL"
},
"title": "Cisco NX-OS Software CLI Command Injection Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2024-20399",
"datePublished": "2024-07-01T16:11:44.028Z",
"dateReserved": "2023-11-08T15:08:07.660Z",
"dateUpdated": "2025-10-21T18:43:58.429Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…