Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2024-1491
Vulnerability from csaf_certbund
Published
2024-07-01 22:00
Modified
2024-07-01 22:00
Summary
Cisco NX-OS: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Cisco NX-OS ist ein Data Center Netzwerk-Betriebssystem für virtualisierte Rechenzentren. NX-OS wurde für Ethernet Switches der Nexus Serie und Fibre Channel Storage Area Network Swiches der MDS Serie entwickelt.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in Cisco NX-OS ausnutzen, um beliebigen Programmcode mit root Rechten auszuführen.
Betroffene Betriebssysteme
- Sonstiges
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Cisco NX-OS ist ein Data Center Netzwerk-Betriebssystem für virtualisierte Rechenzentren. NX-OS wurde für Ethernet Switches der Nexus Serie und Fibre Channel Storage Area Network Swiches der MDS Serie entwickelt.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann eine Schwachstelle in Cisco NX-OS ausnutzen, um beliebigen Programmcode mit root Rechten auszuführen.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1491 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1491.json", }, { category: "self", summary: "WID-SEC-2024-1491 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1491", }, { category: "external", summary: "Cisco Security Bulletin vom 2024-07-01", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP", }, ], source_lang: "en-US", title: "Cisco NX-OS: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode", tracking: { current_release_date: "2024-07-01T22:00:00.000+00:00", generator: { date: "2024-08-15T18:10:46.362+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2024-1491", initial_release_date: "2024-07-01T22:00:00.000+00:00", revision_history: [ { date: "2024-07-01T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Cisco NX-OS", product: { name: "Cisco NX-OS", product_id: "T035723", product_identification_helper: { cpe: "cpe:/o:cisco:nx-os:-", }, }, }, ], category: "vendor", name: "Cisco", }, ], }, vulnerabilities: [ { cve: "CVE-2024-20399", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Cisco NX-OS. Dieser Fehler besteht aufgrund einer unzureichenden Validierung von Argumenten, die an bestimmte Konfigurations-CLI-Befehle übergeben werden. Durch das Einfügen von manipulierten Eingaben als Argument in CLI kann ein lokaler Angreifer diese Schwachstelle ausnutzen, um beliebige Befehle als root auszuführen.", }, ], product_status: { known_affected: [ "T035723", ], }, release_date: "2024-07-01T22:00:00.000+00:00", title: "CVE-2024-20399", }, ], }
cve-2024-20399
Vulnerability from cvelistv5
Published
2024-07-01 16:11
Modified
2024-09-17 18:07
Severity ?
EPSS score ?
Summary
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.
Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges:
Nexus 3000 Series Switches
Nexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later
Nexus 9000 Series Switches in standalone NX-OS mode
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco NX-OS Software |
Version: 8.2(5) Version: 7.3(6)N1(1a) Version: 7.3(5)D1(1) Version: 8.4(2) Version: 7.3(6)N1(1) Version: 6.2(2) Version: 8.4(3) Version: 9.2(3) Version: 7.0(3)I5(2) Version: 8.2(1) Version: 6.0(2)A8(7a) Version: 7.0(3)I4(5) Version: 6.0(2)A6(1) Version: 7.3(1)D1(1) Version: 6.2(14a) Version: 7.0(3)I4(6) Version: 7.3(4)N1(1) Version: 7.0(3)I4(3) Version: 9.2(2v) Version: 6.0(2)A6(5b) Version: 7.3(0)D1(1) Version: 6.2(17a) Version: 7.0(3)I4(7) Version: 6.0(2)U6(1a) Version: 7.1(5)N1(1b) Version: 7.0(3)I4(1) Version: 7.0(3)I4(8) Version: 7.0(3)I4(2) Version: 7.1(4)N1(1c) Version: 7.0(3)IM3(1) Version: 6.0(2)U6(5a) Version: 6.0(2)A8(11) Version: 6.0(2)A6(4a) Version: 6.2(9) Version: 6.2(5) Version: 7.3(4)D1(1) Version: 6.2(20) Version: 9.2(1) Version: 9.2(2t) Version: 9.2(3y) Version: 7.0(3)I4(1t) Version: 6.0(2)U6(5c) Version: 6.0(2)A6(4) Version: 7.0(3)I7(6z) Version: 9.3(2) Version: 7.3(1)DY(1) Version: 7.0(3)F3(3) Version: 6.0(2)U6(6) Version: 6.2(29) Version: 7.0(3)I7(3z) Version: 7.0(3)IM7(2) Version: 6.0(2)A8(11b) Version: 6.2(9a) Version: 7.3(0)N1(1) Version: 7.0(3)I7(5a) Version: 6.2(11d) Version: 8.1(1) Version: 7.0(3)I6(1) Version: 6.0(2)U6(10) Version: 7.2(2)D1(2) Version: 7.0(3)IM3(2) Version: 6.0(2)A6(8) Version: 8.2(2) Version: 6.0(2)U6(1) Version: 7.3(2)N1(1c) Version: 7.0(3)I5(3b) Version: 8.3(2) Version: 7.3(5)N1(1) Version: 6.0(2)A6(2a) Version: 7.3(2)N1(1b) Version: 6.2(27) Version: 7.3(2)D1(3a) Version: 7.3(1)N1(1) Version: 6.0(2)U6(7) Version: 9.2(4) Version: 7.1(4)N1(1a) Version: 7.1(3)N1(4) Version: 7.0(3)IM3(2a) Version: 6.2(8b) Version: 6.0(2)A8(10) Version: 7.1(3)N1(2) Version: 6.2(13) Version: 6.0(2)A8(2) Version: 7.0(3)IC4(4) Version: 6.2(1) Version: 7.3(4)N1(1a) Version: 8.1(2) Version: 6.0(2)A6(3) Version: 6.0(2)U6(5b) Version: 7.0(3)F3(3c) Version: 7.3(3)D1(1) Version: 7.0(3)F3(1) Version: 6.0(2)U6(5) Version: 7.0(3)F3(5) Version: 7.1(2)N1(1) Version: 7.1(3)N1(3) Version: 8.2(3) Version: 6.0(2)A6(7) Version: 7.0(3)I7(2) Version: 6.2(5a) Version: 6.2(18) Version: 6.0(2)A6(5) Version: 7.0(3)IM3(2b) Version: 7.1(3)N1(1) Version: 6.0(2)U6(4a) Version: 7.0(3)I5(3) Version: 7.0(3)I7(3) Version: 6.0(2)A8(6) Version: 7.0(3)I6(2) Version: 8.3(1) Version: 6.2(3) Version: 6.2(22) Version: 7.1(1)N1(1) Version: 8.4(1) Version: 8.1(1b) Version: 7.3(0)N1(1b) Version: 7.2(2)D1(4) Version: 6.0(2)A8(5) Version: 7.3(0)DX(1) Version: 7.1(4)N1(1d) Version: 7.3(2)D1(1) Version: 7.3(2)N1(1) Version: 6.0(2)U6(8) Version: 7.1(1)N1(1a) Version: 7.0(3)IM3(3) Version: 9.3(1) Version: 6.0(2)U6(2) Version: 6.2(9b) Version: 7.1(3)N1(2a) Version: 7.3(0)N1(1a) Version: 6.0(2)A8(7) Version: 7.0(3)I7(6) Version: 7.3(2)D1(2) Version: 6.2(25) Version: 6.0(2)U6(3a) Version: 8.0(1) Version: 6.0(2)A8(11a) Version: 6.2(11e) Version: 7.1(3)N1(5) Version: 7.0(3)I4(8z) Version: 6.2(11) Version: 7.0(3)I4(9) Version: 6.2(16) Version: 6.2(19) Version: 8.2(4) Version: 6.2(2a) Version: 7.2(2)D1(3) Version: 7.1(0)N1(1b) Version: 7.0(3)I7(4) Version: 7.0(3)I7(7) Version: 6.2(5b) Version: 7.3(0)DY(1) Version: 6.0(2)A8(9) Version: 6.0(2)A8(1) Version: 7.1(5)N1(1) Version: 7.2(1)D1(1) Version: 6.2(15) Version: 6.0(2)A6(6) Version: 6.0(2)A8(10a) Version: 7.0(3)I5(1) Version: 9.3(1z) Version: 9.2(2) Version: 6.2(7) Version: 6.2(9c) Version: 7.0(3)F3(4) Version: 7.3(3)N1(1) Version: 6.2(6b) Version: 7.0(3)I4(8b) Version: 8.1(2a) Version: 7.3(2)D1(3) Version: 6.2(8) Version: 6.0(2)A8(3) Version: 6.2(11b) Version: 7.0(3)I4(6t) Version: 7.0(3)I5(3a) Version: 8.1(1a) Version: 6.2(13a) Version: 6.0(2)A8(8) Version: 7.0(3)I7(5) Version: 7.0(3)F3(3a) Version: 7.1(0)N1(1a) Version: 6.0(2)A8(4) Version: 6.0(2)A6(3a) Version: 6.0(2)A6(5a) Version: 7.0(3)F2(1) Version: 7.0(3)I4(8a) Version: 6.0(2)U6(9) Version: 7.0(3)F3(2) Version: 6.0(2)U6(2a) Version: 6.2(12) Version: 6.2(17) Version: 7.0(3)I4(4) Version: 6.2(23) Version: 6.2(13b) Version: 6.0(2)U6(3) Version: 6.2(10) Version: 6.2(6a) Version: 6.2(6) Version: 7.1(2)N1(1a) Version: 6.2(14) Version: 7.0(3)I7(1) Version: 6.2(14b) Version: 6.2(21) Version: 7.2(2)D1(1) Version: 7.0(3)F2(2) Version: 7.0(3)IA7(2) Version: 7.0(3)IA7(1) Version: 6.0(2)A8(7b) Version: 6.2(8a) Version: 6.2(11c) Version: 7.0(3)F1(1) Version: 6.0(2)A6(1a) Version: 7.1(0)N1(1) Version: 7.2(0)D1(1) Version: 6.0(2)A6(2) Version: 7.1(4)N1(1) Version: 6.0(2)A8(4a) Version: 6.2(20a) Version: 6.0(2)U6(4) Version: 8.4(1a) Version: 9.3(3) Version: 7.3(2)D1(1d) Version: 7.3(7)N1(1) Version: 6.2(24) Version: 6.2(31) Version: 7.0(3)I7(8) Version: 6.0(2)U6(10a) Version: 7.3(7)N1(1a) Version: 9.3(4) Version: 7.3(6)D1(1) Version: 6.2(26) Version: 8.2(6) Version: 6.2(33) Version: 9.3(5) Version: 8.4(2a) Version: 8.4(2b) Version: 7.3(8)N1(1) Version: 7.0(3)I7(9) Version: 7.3(7)N1(1b) Version: 6.2(24a) Version: 8.5(1) Version: 9.3(6) Version: 10.1(2) Version: 10.1(1) Version: 8.4(4) Version: 7.3(7)D1(1) Version: 8.4(2c) Version: 9.3(5w) Version: 8.2(7) Version: 7.3(9)N1(1) Version: 9.3(7) Version: 9.3(7k) Version: 7.0(3)I7(9w) Version: 10.2(1) Version: 7.3(8)N1(1a) Version: 7.3(8)D1(1) Version: 9.3(7a) Version: 8.2(7a) Version: 9.3(8) Version: 8.4(4a) Version: 8.4(2d) Version: 7.3(10)N1(1) Version: 8.4(5) Version: 7.0(3)I7(10) Version: 7.3(8)N1(1b) Version: 8.2(8) Version: 10.2(1q) Version: 10.2(2) Version: 9.3(9) Version: 7.3(9)D1(1) Version: 7.3(11)N1(1) Version: 10.2(3) Version: 8.4(6) Version: 8.4(2e) Version: 9.3(10) Version: 7.3(11)N1(1a) Version: 10.2(2a) Version: 7.3(12)N1(1) Version: 9.2(1a) Version: 8.2(9) Version: 10.3(1) Version: 10.2(4) Version: 7.3(13)N1(1) Version: 8.4(7) Version: 10.3(2) Version: 8.4(6a) Version: 9.3(11) Version: 10.3(3) Version: 10.2(5) Version: 9.4(1) Version: 9.3(2a) Version: 8.4(2f) Version: 8.2(10) Version: 9.3(12) Version: 10.4(1) Version: 8.4(8) Version: 10.3(99w) Version: 7.3(14)N1(1) Version: 10.2(6) Version: 10.3(3w) Version: 10.3(99x) Version: 10.3(3o) Version: 8.4(9) Version: 10.3(4) Version: 10.3(3p) Version: 10.3(4a) Version: 9.4(1a) Version: 10.4(2) Version: 10.3(3q) Version: 9.3(13) Version: 8.2(11) Version: 9.4(2) Version: 10.3(5) Version: 10.2(7) Version: 10.3(3x) Version: 10.3(4g) Version: 10.2(8) Version: 10.3(3r) |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(7b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(10a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(11a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(11b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(5c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(6b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(8a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(8b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(18\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(16\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(14\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(6a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(20\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(9a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(9b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(13a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(13b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(17\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(20a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(22\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(27\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(29\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(24\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(24a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(33\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(3c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(8a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(8b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(8z\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I5\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)N1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)N1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(1\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(2\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)N1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(5\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(5\\)N1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.2\\(1\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)D1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)DX\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)D1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)D1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)D1\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(3\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.1\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.3\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(2t\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(2v\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(3\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(5\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(2c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(6a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(12\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(13\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(5\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)N1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)N1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(8\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(9\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(10\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(8\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(1q\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(3t\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(9\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(11\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(12\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(99w\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(99x\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(13\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(14\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.4\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.4\\(2\\):*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "nx-os", vendor: "cisco", versions: [ { status: "affected", version: "6.0\\(2\\)a6\\(1\\)", }, { status: "affected", version: "6.0\\(2\\)A6\\(1a\\)", }, { status: "affected", version: "6.0\\(2\\)A6\\(2\\)", }, { status: "affected", version: "6.0\\(2\\)A6\\(2a\\)", }, { status: "affected", version: "6.0\\(2\\)A6\\(3\\)", }, { status: "affected", version: "6.0\\(2\\)A6\\(3a\\)", }, { status: "affected", version: "6.0\\(2\\)A6\\(4\\)", }, { status: "affected", version: "6.0\\(2\\)A6\\(4a\\)", }, { status: "affected", version: "6.0\\(2\\)A6\\(5a\\)", }, { status: "affected", version: "6.0\\(2\\)A6\\(5b\\)", }, { status: "affected", version: "6.0\\(2\\)A6\\(6\\)", }, { status: "affected", version: "6.0\\(2\\)A6\\(7\\)", }, { status: "affected", version: "6.0\\(2\\)A6\\(8\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(1\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(2\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(3\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(4\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(4a\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(5\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(6\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(7\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(7a\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(7b\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(8\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(9\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(10a\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(10\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(11\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(11a\\)", }, { status: "affected", version: "6.0\\(2\\)A8\\(11b\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(1\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(2\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(3\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(4\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(5\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(6\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(7\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(8\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(1a\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(2a\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(3a\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(4a\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(5a\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(5b\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(5c\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(9\\)", }, { status: "affected", version: "6.0\\(2\\)U6\\(10\\)", }, { status: "affected", version: "6.2\\(2\\)", }, { status: "affected", version: "6.2\\(2a\\)", }, { status: "affected", version: "6.2\\(6\\)", }, { status: "affected", version: "6.2\\(6b\\)", }, { status: "affected", version: "6.2\\(8\\)", }, { status: "affected", version: "6.2\\(8a\\)", }, { status: "affected", version: "6.2\\(8b\\)", }, { status: "affected", version: "6.2\\(10\\)", }, { status: "affected", version: "6.2\\(12\\)", }, { status: "affected", version: "6.2\\(18\\)", }, { status: "affected", version: "6.2\\(16\\)", }, { status: "affected", version: "6.2\\(14\\)", }, { status: "affected", version: "6.2\\(6a\\)", }, { status: "affected", version: "6.2\\(20\\)", }, { status: "affected", version: "6.2\\(1\\)", }, { status: "affected", version: "6.2\\(5b\\)", }, { status: "affected", version: "6.2\\(9\\)", }, { status: "affected", version: "6.2\\(9a\\)", }, { status: "affected", version: "6.2\\(9b\\)", }, { status: "affected", version: "6.2\\(11\\)", }, { status: "affected", version: "6.2\\(13a\\)", }, { status: "affected", version: "6.2\\(13b\\)", }, { status: "affected", version: "6.2\\(17\\)", }, { status: "affected", version: "6.2\\(20a\\)", }, { status: "affected", version: "6.2\\(22\\)", }, { status: "affected", version: "6.2\\(27\\)", }, { status: "affected", version: "6.2\\(29\\)", }, { status: "affected", version: "6.2\\(24\\)", }, { status: "affected", version: "6.2\\(24a\\)", }, { status: "affected", version: "6.2\\(33\\)", }, { status: "affected", version: "7.0\\(3\\)F1\\(1\\)", }, { status: "affected", version: "7.0\\(3\\)F2\\(1\\)", }, { status: "affected", version: "7.0\\(3\\)F2\\(2\\)", }, { status: "affected", version: "7.0\\(3\\)F3\\(1\\)", }, { status: "affected", version: "7.0\\(3\\)F3\\(3\\)", }, { status: "affected", version: "7.0\\(3\\)F3\\(3a\\)", }, { status: "affected", version: "7.0\\(3\\)F3\\(4\\)", }, { status: "affected", version: "7.0\\(3\\)F3\\(3c\\)", }, { status: "affected", version: "7.0\\(3\\)F3\\(5\\)", }, { status: "affected", version: "7.0\\(3\\)I4\\(1\\)", }, { status: "affected", version: "7.0\\(3\\)I4\\(2\\)", }, { status: "affected", version: "7.0\\(3\\)I4\\(3\\)", }, { status: "affected", version: "7.0\\(3\\)I4\\(4\\)", }, { status: "affected", version: "7.0\\(3\\)I4\\(5\\)", }, { status: "affected", version: "7.0\\(3\\)I4\\(6\\)", }, { status: "affected", version: "7.0\\(3\\)I4\\(7\\)", }, { status: "affected", version: "7.0\\(3\\)I4\\(8\\)", }, { status: "affected", version: "7.0\\(3\\)I4\\(8a\\)", }, { status: "affected", version: "7.0\\(3\\)I4\\(8b\\)", }, { status: "affected", version: "7.0\\(3\\)I4\\(8z\\)", }, { status: "affected", version: "7.0\\(3\\)I4\\(9\\)", }, { status: "affected", version: "7.0\\(3\\)I5\\(1\\)", }, { status: "affected", version: "7.0\\(3\\)I5\\(2\\)", }, { status: "affected", version: "7.0\\(3\\)I6\\(1\\)", }, { status: "affected", version: "7.0\\(3\\)I6\\(2\\)", }, { status: "affected", version: "7.0\\(3\\)I7\\(1\\)", }, { status: "affected", version: "7.0\\(3\\)I7\\(2\\)", }, { status: "affected", version: "7.0\\(3\\)I7\\(3\\)", }, { status: "affected", version: "7.0\\(3\\)I7\\(4\\)", }, { status: "affected", version: "7.0\\(3\\)I7\\(5\\)", }, { status: "affected", version: "7.0\\(3\\)I7\\(5a\\)", }, { status: "affected", version: "7.0\\(3\\)I7\\(6\\)", }, { status: "affected", version: "7.0\\(3\\)I7\\(7\\)", }, { status: "affected", version: "7.0\\(3\\)I7\\(8\\)", }, { status: "affected", version: "7.0\\(3\\)I7\\(9\\)", }, { status: "affected", version: "7.0\\(3\\)I7\\(10\\)", }, { status: "affected", version: "7.1\\(0\\)N1\\(1a\\)", }, { status: "affected", version: "7.1\\(0\\)N1\\(1b\\)", }, { status: "affected", version: "7.1\\(0\\)N1\\(1\\)", }, { status: "affected", version: "7.1\\(1\\)N1\\(1\\)", }, { status: "affected", version: "7.1\\(2\\)N1\\(1\\)", }, { status: "affected", version: "7.1\\(3\\)N1\\(1\\)", }, { status: "affected", version: "7.1\\(3\\)N1\\(2\\)", }, { status: "affected", version: "7.1\\(4\\)N1\\(1\\)", }, { status: "affected", version: "7.1\\(5\\)N1\\(1\\)", }, { status: "affected", version: "7.1\\(5\\)N1\\(1b\\)", }, { status: "affected", version: "7.2\\(0\\)D1\\(1\\)", }, { status: "affected", version: "7.2\\(1\\)D1\\(1\\)", }, { status: "affected", version: "7.2\\(2\\)D1\\(2\\)", }, { status: "affected", version: "7.2\\(2\\)D1\\(1\\)", }, { status: "affected", version: "7.3\\(0\\)D1\\(1\\)", }, { status: "affected", version: "7.3\\(0\\)DX\\(1\\)", }, { status: "affected", version: "7.3\\(0\\)N1\\(1\\)", }, { status: "affected", version: "7.3\\(1\\)D1\\(1\\)", }, { status: "affected", version: "7.3\\(1\\)N1\\(1\\)", }, { status: "affected", version: "7.3\\(2\\)D1\\(1\\)", }, { status: "affected", version: "7.3\\(2\\)D1\\(2\\)", }, { status: "affected", version: "7.3\\(2\\)D1\\(3\\)", }, { status: "affected", version: "7.3\\(2\\)D1\\(3a\\)", }, { status: "affected", version: "7.3\\(2\\)N1\\(1\\)", }, { status: "affected", version: "7.3\\(3\\)N1\\(1\\)", }, { status: "affected", version: "8.0\\(1\\)", }, { status: "affected", version: "8.1\\(1\\)", }, { status: "affected", version: "8.1\\(2\\)", }, { status: "affected", version: "8.1\\(2a\\)", }, { status: "affected", version: "8.1\\(1b\\)", }, { status: "affected", version: "8.2\\(1\\)", }, { status: "affected", version: "8.2\\(2\\)", }, { status: "affected", version: "8.2\\(3\\)", }, { status: "affected", version: "8.2\\(4\\)", }, { status: "affected", version: "8.2\\(5\\)", }, { status: "affected", version: "8.2\\(6\\)", }, { status: "affected", version: "8.2\\(7\\)", }, { status: "affected", version: "8.2\\(7a\\)", }, { status: "affected", version: "8.2\\(8\\)", }, { status: "affected", version: "8.2\\(9\\)", }, { status: "affected", version: "8.2\\(10\\)", }, { status: "affected", version: "8.2\\(11\\)", }, { status: "affected", version: "8.3\\(1\\)", }, { status: "affected", version: "8.3\\(2\\)", }, { status: "affected", version: "9.2\\(1\\)", }, { status: "affected", version: "9.2\\(2\\)", }, { status: "affected", version: "9.2\\(2t\\)", }, { status: "affected", version: "9.2\\(3\\)", }, { status: "affected", version: "9.2\\(4\\)", }, { status: "affected", version: "9.2\\(2v\\)", }, { status: "affected", version: "7.3\\(4\\)N1\\(1\\)", }, { status: "affected", version: "7.3\\(3\\)D1\\(1\\)", }, { status: "affected", version: "7.3\\(4\\)D1\\(1\\)", }, { status: "affected", version: "7.3\\(5\\)N1\\(1\\)", }, { status: "affected", version: "8.4\\(1\\)", }, { status: "affected", version: "8.4\\(2\\)", }, { status: "affected", version: "8.4\\(3\\)", }, { status: "affected", version: "8.4\\(2b\\)", }, { status: "affected", version: "8.4\\(4\\)", }, { status: "affected", version: "8.4\\(2c\\)", }, { status: "affected", version: "8.4\\(4a\\)", }, { status: "affected", version: "8.4\\(5\\)", }, { status: "affected", version: "8.4\\(6\\)", }, { status: "affected", version: "8.4\\(6a\\)", }, { status: "affected", version: "8.4\\(7\\)", }, { status: "affected", version: "8.4\\(2f\\)", }, { status: "affected", version: "8.4\\(8\\)", }, { status: "affected", version: "8.4\\(9\\)", }, { status: "affected", version: "9.3\\(1\\)", }, { status: "affected", version: "9.3\\(2\\)", }, { status: "affected", version: "9.3\\(3\\)", }, { status: "affected", version: "9.3\\(4\\)", }, { status: "affected", version: "9.3\\(5\\)", }, { status: "affected", version: "9.3\\(6\\)", }, { status: "affected", version: "9.3\\(7\\)", }, { status: "affected", version: "9.3\\(7a\\)", }, { status: "affected", version: "9.3\\(8\\)", }, { status: "affected", version: "9.3\\(9\\)", }, { status: "affected", version: "9.3\\(10\\)", }, { status: "affected", version: "9.3\\(11\\)", }, { status: "affected", version: "9.3\\(2a\\)", }, { status: "affected", version: "9.3\\(12\\)", }, { status: "affected", version: "9.3\\(13\\)", }, { status: "affected", version: "7.3\\(6\\)N1\\(1\\)", }, { status: "affected", version: "7.3\\(5\\)D1\\(1\\)", }, { status: "affected", version: "7.3\\(7\\)N1\\(1\\)", }, { status: "affected", version: "7.3\\(7\\)N1\\(1a\\)", }, { status: "affected", version: "7.3\\(7\\)N1\\(1b\\)", }, { status: "affected", version: "7.3\\(6\\)D1\\(1\\)", }, { status: "affected", version: "7.3\\(8\\)N1\\(1\\)", }, { status: "affected", version: "7.3\\(7\\)D1\\(1\\)", }, { status: "affected", version: "7.3\\(9\\)N1\\(1\\)", }, { status: "affected", version: "10.1\\(1\\)", }, { status: "affected", version: "8.5\\(1\\)", }, { status: "affected", version: "7.3\\(10\\)N1\\(1\\)", }, { status: "affected", version: "7.3\\(8\\)D1\\(1\\)", }, { status: "affected", version: "10.2\\(1\\)", }, { status: "affected", version: "10.2\\(1q\\)", }, { status: "affected", version: "10.2\\(2\\)", }, { status: "affected", version: "10.2\\(3\\)", }, { status: "affected", version: "10.2\\(3t\\)", }, { status: "affected", version: "7.3\\(9\\)D1\\(1\\)", }, { status: "affected", version: "7.3\\(11\\)N1\\(1\\)", }, { status: "affected", version: "7.3\\(12\\)N1\\(1\\)", }, { status: "affected", version: "10.3\\(1\\)", }, { status: "affected", version: "10.3\\(3\\)", }, { status: "affected", version: "10.3\\(99w\\)", }, { status: "affected", version: "10.3\\(99x\\)", }, { status: "affected", version: "10.3\\(4a\\)", }, { status: "affected", version: "10.3\\(5\\)", }, { status: "affected", version: "7.3\\(13\\)N1\\(1\\)", }, { status: "affected", version: "7.3\\(14\\)N1\\(1\\)", }, { status: "affected", version: "10.4\\(1\\)", }, { status: "affected", version: "10.4\\(2\\)", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-20399", options: [ { Exploitation: "active", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-07-02T15:08:04.278010Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2024-07-02", reference: "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-07-02T20:40:44.265Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T21:59:42.407Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-nxos-cmd-injection-xD9OhyOP", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP", }, { tags: [ "x_transferred", ], url: "https://www.sygnia.co/threat-reports-and-advisories/china-nexus-threat-group-velvet-ant-exploits-cisco-0-day/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco NX-OS Software", vendor: "Cisco", versions: [ { status: "affected", version: "8.2(5)", }, { status: "affected", version: "7.3(6)N1(1a)", }, { status: "affected", version: "7.3(5)D1(1)", }, { status: "affected", version: "8.4(2)", }, { status: "affected", version: "7.3(6)N1(1)", }, { status: "affected", version: "6.2(2)", }, { status: "affected", version: "8.4(3)", }, { status: "affected", version: "9.2(3)", }, { status: "affected", version: "7.0(3)I5(2)", }, { status: "affected", version: "8.2(1)", }, { status: "affected", version: "6.0(2)A8(7a)", }, { status: "affected", version: "7.0(3)I4(5)", }, { status: "affected", version: "6.0(2)A6(1)", }, { status: "affected", version: "7.3(1)D1(1)", }, { status: "affected", version: "6.2(14a)", }, { status: "affected", version: "7.0(3)I4(6)", }, { status: "affected", version: "7.3(4)N1(1)", }, { status: "affected", version: "7.0(3)I4(3)", }, { status: "affected", version: "9.2(2v)", }, { status: "affected", version: "6.0(2)A6(5b)", }, { status: "affected", version: "7.3(0)D1(1)", }, { status: "affected", version: "6.2(17a)", }, { status: "affected", version: "7.0(3)I4(7)", }, { status: "affected", version: "6.0(2)U6(1a)", }, { status: "affected", version: "7.1(5)N1(1b)", }, { status: "affected", version: "7.0(3)I4(1)", }, { status: "affected", version: "7.0(3)I4(8)", }, { status: "affected", version: "7.0(3)I4(2)", }, { status: "affected", version: "7.1(4)N1(1c)", }, { status: "affected", version: "7.0(3)IM3(1)", }, { status: "affected", version: "6.0(2)U6(5a)", }, { status: "affected", version: "6.0(2)A8(11)", }, { status: "affected", version: "6.0(2)A6(4a)", }, { status: "affected", version: "6.2(9)", }, { status: "affected", version: "6.2(5)", }, { status: "affected", version: "7.3(4)D1(1)", }, { status: "affected", version: "6.2(20)", }, { status: "affected", version: "9.2(1)", }, { status: "affected", version: "9.2(2t)", }, { status: "affected", version: "9.2(3y)", }, { status: "affected", version: "7.0(3)I4(1t)", }, { status: "affected", version: "6.0(2)U6(5c)", }, { status: "affected", version: "6.0(2)A6(4)", }, { status: "affected", version: "7.0(3)I7(6z)", }, { status: "affected", version: "9.3(2)", }, { status: "affected", version: "7.3(1)DY(1)", }, { status: "affected", version: "7.0(3)F3(3)", }, { status: "affected", version: "6.0(2)U6(6)", }, { status: "affected", version: "6.2(29)", }, { status: "affected", version: "7.0(3)I7(3z)", }, { status: "affected", version: "7.0(3)IM7(2)", }, { status: "affected", version: "6.0(2)A8(11b)", }, { status: "affected", version: "6.2(9a)", }, { status: "affected", version: "7.3(0)N1(1)", }, { status: "affected", version: "7.0(3)I7(5a)", }, { status: "affected", version: "6.2(11d)", }, { status: "affected", version: "8.1(1)", }, { status: "affected", version: "7.0(3)I6(1)", }, { status: "affected", version: "6.0(2)U6(10)", }, { status: "affected", version: "7.2(2)D1(2)", }, { status: "affected", version: "7.0(3)IM3(2)", }, { status: "affected", version: "6.0(2)A6(8)", }, { status: "affected", version: "8.2(2)", }, { status: "affected", version: "6.0(2)U6(1)", }, { status: "affected", version: "7.3(2)N1(1c)", }, { status: "affected", version: "7.0(3)I5(3b)", }, { status: "affected", version: "8.3(2)", }, { status: "affected", version: "7.3(5)N1(1)", }, { status: "affected", version: "6.0(2)A6(2a)", }, { status: "affected", version: "7.3(2)N1(1b)", }, { status: "affected", version: "6.2(27)", }, { status: "affected", version: "7.3(2)D1(3a)", }, { status: "affected", version: "7.3(1)N1(1)", }, { status: "affected", version: "6.0(2)U6(7)", }, { status: "affected", version: "9.2(4)", }, { status: "affected", version: "7.1(4)N1(1a)", }, { status: "affected", version: "7.1(3)N1(4)", }, { status: "affected", version: "7.0(3)IM3(2a)", }, { status: "affected", version: "6.2(8b)", }, { status: "affected", version: "6.0(2)A8(10)", }, { status: "affected", version: "7.1(3)N1(2)", }, { status: "affected", version: "6.2(13)", }, { status: "affected", version: "6.0(2)A8(2)", }, { status: "affected", version: "7.0(3)IC4(4)", }, { status: "affected", version: "6.2(1)", }, { status: "affected", version: "7.3(4)N1(1a)", }, { status: "affected", version: "8.1(2)", }, { status: "affected", version: "6.0(2)A6(3)", }, { status: "affected", version: "6.0(2)U6(5b)", }, { status: "affected", version: "7.0(3)F3(3c)", }, { status: "affected", version: "7.3(3)D1(1)", }, { status: "affected", version: "7.0(3)F3(1)", }, { status: "affected", version: "6.0(2)U6(5)", }, { status: "affected", version: "7.0(3)F3(5)", }, { status: "affected", version: "7.1(2)N1(1)", }, { status: "affected", version: "7.1(3)N1(3)", }, { status: "affected", version: "8.2(3)", }, { status: "affected", version: "6.0(2)A6(7)", }, { status: "affected", version: "7.0(3)I7(2)", }, { status: "affected", version: "6.2(5a)", }, { status: "affected", version: "6.2(18)", }, { status: "affected", version: "6.0(2)A6(5)", }, { status: "affected", version: "7.0(3)IM3(2b)", }, { status: "affected", version: "7.1(3)N1(1)", }, { status: "affected", version: "6.0(2)U6(4a)", }, { status: "affected", version: "7.0(3)I5(3)", }, { status: "affected", version: "7.0(3)I7(3)", }, { status: "affected", version: "6.0(2)A8(6)", }, { status: "affected", version: "7.0(3)I6(2)", }, { status: "affected", version: "8.3(1)", }, { status: "affected", version: "6.2(3)", }, { status: "affected", version: "6.2(22)", }, { status: "affected", version: "7.1(1)N1(1)", }, { status: "affected", version: "8.4(1)", }, { status: "affected", version: "8.1(1b)", }, { status: "affected", version: "7.3(0)N1(1b)", }, { status: "affected", version: "7.2(2)D1(4)", }, { status: "affected", version: "6.0(2)A8(5)", }, { status: "affected", version: "7.3(0)DX(1)", }, { status: "affected", version: "7.1(4)N1(1d)", }, { status: "affected", version: "7.3(2)D1(1)", }, { status: "affected", version: "7.3(2)N1(1)", }, { status: "affected", version: "6.0(2)U6(8)", }, { status: "affected", version: "7.1(1)N1(1a)", }, { status: "affected", version: "7.0(3)IM3(3)", }, { status: "affected", version: "9.3(1)", }, { status: "affected", version: "6.0(2)U6(2)", }, { status: "affected", version: "6.2(9b)", }, { status: "affected", version: "7.1(3)N1(2a)", }, { status: "affected", version: "7.3(0)N1(1a)", }, { status: "affected", version: "6.0(2)A8(7)", }, { status: "affected", version: "7.0(3)I7(6)", }, { status: "affected", version: "7.3(2)D1(2)", }, { status: "affected", version: "6.2(25)", }, { status: "affected", version: "6.0(2)U6(3a)", }, { status: "affected", version: "8.0(1)", }, { status: "affected", version: "6.0(2)A8(11a)", }, { status: "affected", version: "6.2(11e)", }, { status: "affected", version: "7.1(3)N1(5)", }, { status: "affected", version: "7.0(3)I4(8z)", }, { status: "affected", version: "6.2(11)", }, { status: "affected", version: "7.0(3)I4(9)", }, { status: "affected", version: "6.2(16)", }, { status: "affected", version: "6.2(19)", }, { status: "affected", version: "8.2(4)", }, { status: "affected", version: "6.2(2a)", }, { status: "affected", version: "7.2(2)D1(3)", }, { status: "affected", version: "7.1(0)N1(1b)", }, { status: "affected", version: "7.0(3)I7(4)", }, { status: "affected", version: "7.0(3)I7(7)", }, { status: "affected", version: "6.2(5b)", }, { status: "affected", version: "7.3(0)DY(1)", }, { status: "affected", version: "6.0(2)A8(9)", }, { status: "affected", version: "6.0(2)A8(1)", }, { status: "affected", version: "7.1(5)N1(1)", }, { status: "affected", version: "7.2(1)D1(1)", }, { status: "affected", version: "6.2(15)", }, { status: "affected", version: "6.0(2)A6(6)", }, { status: "affected", version: "6.0(2)A8(10a)", }, { status: "affected", version: "7.0(3)I5(1)", }, { status: "affected", version: "9.3(1z)", }, { status: "affected", version: "9.2(2)", }, { status: "affected", version: "6.2(7)", }, { status: "affected", version: "6.2(9c)", }, { status: "affected", version: "7.0(3)F3(4)", }, { status: "affected", version: "7.3(3)N1(1)", }, { status: "affected", version: "6.2(6b)", }, { status: "affected", version: "7.0(3)I4(8b)", }, { status: "affected", version: "8.1(2a)", }, { status: "affected", version: "7.3(2)D1(3)", }, { status: "affected", version: "6.2(8)", }, { status: "affected", version: "6.0(2)A8(3)", }, { status: "affected", version: "6.2(11b)", }, { status: "affected", version: "7.0(3)I4(6t)", }, { status: "affected", version: "7.0(3)I5(3a)", }, { status: "affected", version: "8.1(1a)", }, { status: "affected", version: "6.2(13a)", }, { status: "affected", version: "6.0(2)A8(8)", }, { status: "affected", version: "7.0(3)I7(5)", }, { status: "affected", version: "7.0(3)F3(3a)", }, { status: "affected", version: "7.1(0)N1(1a)", }, { status: "affected", version: "6.0(2)A8(4)", }, { status: "affected", version: "6.0(2)A6(3a)", }, { status: "affected", version: "6.0(2)A6(5a)", }, { status: "affected", version: "7.0(3)F2(1)", }, { status: "affected", version: "7.0(3)I4(8a)", }, { status: "affected", version: "6.0(2)U6(9)", }, { status: "affected", version: "7.0(3)F3(2)", }, { status: "affected", version: "6.0(2)U6(2a)", }, { status: "affected", version: "6.2(12)", }, { status: "affected", version: "6.2(17)", }, { status: "affected", version: "7.0(3)I4(4)", }, { status: "affected", version: "6.2(23)", }, { status: "affected", version: "6.2(13b)", }, { status: "affected", version: "6.0(2)U6(3)", }, { status: "affected", version: "6.2(10)", }, { status: "affected", version: "6.2(6a)", }, { status: "affected", version: "6.2(6)", }, { status: "affected", version: "7.1(2)N1(1a)", }, { status: "affected", version: "6.2(14)", }, { status: "affected", version: "7.0(3)I7(1)", }, { status: "affected", version: "6.2(14b)", }, { status: "affected", version: "6.2(21)", }, { status: "affected", version: "7.2(2)D1(1)", }, { status: "affected", version: "7.0(3)F2(2)", }, { status: "affected", version: "7.0(3)IA7(2)", }, { status: "affected", version: "7.0(3)IA7(1)", }, { status: "affected", version: "6.0(2)A8(7b)", }, { status: "affected", version: "6.2(8a)", }, { status: "affected", version: "6.2(11c)", }, { status: "affected", version: "7.0(3)F1(1)", }, { status: "affected", version: "6.0(2)A6(1a)", }, { status: "affected", version: "7.1(0)N1(1)", }, { status: "affected", version: "7.2(0)D1(1)", }, { status: "affected", version: "6.0(2)A6(2)", }, { status: "affected", version: "7.1(4)N1(1)", }, { status: "affected", version: "6.0(2)A8(4a)", }, { status: "affected", version: "6.2(20a)", }, { status: "affected", version: "6.0(2)U6(4)", }, { status: "affected", version: "8.4(1a)", }, { status: "affected", version: "9.3(3)", }, { status: "affected", version: "7.3(2)D1(1d)", }, { status: "affected", version: "7.3(7)N1(1)", }, { status: "affected", version: "6.2(24)", }, { status: "affected", version: "6.2(31)", }, { status: "affected", version: "7.0(3)I7(8)", }, { status: "affected", version: "6.0(2)U6(10a)", }, { status: "affected", version: "7.3(7)N1(1a)", }, { status: "affected", version: "9.3(4)", }, { status: "affected", version: "7.3(6)D1(1)", }, { status: "affected", version: "6.2(26)", }, { status: "affected", version: "8.2(6)", }, { status: "affected", version: "6.2(33)", }, { status: "affected", version: "9.3(5)", }, { status: "affected", version: "8.4(2a)", }, { status: "affected", version: "8.4(2b)", }, { status: "affected", version: "7.3(8)N1(1)", }, { status: "affected", version: "7.0(3)I7(9)", }, { status: "affected", version: "7.3(7)N1(1b)", }, { status: "affected", version: "6.2(24a)", }, { status: "affected", version: "8.5(1)", }, { status: "affected", version: "9.3(6)", }, { status: "affected", version: "10.1(2)", }, { status: "affected", version: "10.1(1)", }, { status: "affected", version: "8.4(4)", }, { status: "affected", version: "7.3(7)D1(1)", }, { status: "affected", version: "8.4(2c)", }, { status: "affected", version: "9.3(5w)", }, { status: "affected", version: "8.2(7)", }, { status: "affected", version: "7.3(9)N1(1)", }, { status: "affected", version: "9.3(7)", }, { status: "affected", version: "9.3(7k)", }, { status: "affected", version: "7.0(3)I7(9w)", }, { status: "affected", version: "10.2(1)", }, { status: "affected", version: "7.3(8)N1(1a)", }, { status: "affected", version: "7.3(8)D1(1)", }, { status: "affected", version: "9.3(7a)", }, { status: "affected", version: "8.2(7a)", }, { status: "affected", version: "9.3(8)", }, { status: "affected", version: "8.4(4a)", }, { status: "affected", version: "8.4(2d)", }, { status: "affected", version: "7.3(10)N1(1)", }, { status: "affected", version: "8.4(5)", }, { status: "affected", version: "7.0(3)I7(10)", }, { status: "affected", version: "7.3(8)N1(1b)", }, { status: "affected", version: "8.2(8)", }, { status: "affected", version: "10.2(1q)", }, { status: "affected", version: "10.2(2)", }, { status: "affected", version: "9.3(9)", }, { status: "affected", version: "7.3(9)D1(1)", }, { status: "affected", version: "7.3(11)N1(1)", }, { status: "affected", version: "10.2(3)", }, { status: "affected", version: "8.4(6)", }, { status: "affected", version: "8.4(2e)", }, { status: "affected", version: "9.3(10)", }, { status: "affected", version: "7.3(11)N1(1a)", }, { status: "affected", version: "10.2(2a)", }, { status: "affected", version: "7.3(12)N1(1)", }, { status: "affected", version: "9.2(1a)", }, { status: "affected", version: "8.2(9)", }, { status: "affected", version: "10.3(1)", }, { status: "affected", version: "10.2(4)", }, { status: "affected", version: "7.3(13)N1(1)", }, { status: "affected", version: "8.4(7)", }, { status: "affected", version: "10.3(2)", }, { status: "affected", version: "8.4(6a)", }, { status: "affected", version: "9.3(11)", }, { status: "affected", version: "10.3(3)", }, { status: "affected", version: "10.2(5)", }, { status: "affected", version: "9.4(1)", }, { status: "affected", version: "9.3(2a)", }, { status: "affected", version: "8.4(2f)", }, { status: "affected", version: "8.2(10)", }, { status: "affected", version: "9.3(12)", }, { status: "affected", version: "10.4(1)", }, { status: "affected", version: "8.4(8)", }, { status: "affected", version: "10.3(99w)", }, { status: "affected", version: "7.3(14)N1(1)", }, { status: "affected", version: "10.2(6)", }, { status: "affected", version: "10.3(3w)", }, { status: "affected", version: "10.3(99x)", }, { status: "affected", version: "10.3(3o)", }, { status: "affected", version: "8.4(9)", }, { status: "affected", version: "10.3(4)", }, { status: "affected", version: "10.3(3p)", }, { status: "affected", version: "10.3(4a)", }, { status: "affected", version: "9.4(1a)", }, { status: "affected", version: "10.4(2)", }, { status: "affected", version: "10.3(3q)", }, { status: "affected", version: "9.3(13)", }, { status: "affected", version: "8.2(11)", }, { status: "affected", version: "9.4(2)", }, { status: "affected", version: "10.3(5)", }, { status: "affected", version: "10.2(7)", }, { status: "affected", version: "10.3(3x)", }, { status: "affected", version: "10.3(4g)", }, { status: "affected", version: "10.2(8)", }, { status: "affected", version: "10.3(3r)", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.\r\nNote: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges:\r\n\r\nNexus 3000 Series Switches\r\nNexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later\r\nNexus 9000 Series Switches in standalone NX-OS mode", }, ], exploits: [ { lang: "en", value: "In May 2024, the Cisco Product Security Incident Response Team (PSIRT) became aware of attempted exploitation of this vulnerability in the wild.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-09-17T18:07:44.853Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-nxos-cmd-injection-xD9OhyOP", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP", }, ], source: { advisory: "cisco-sa-nxos-cmd-injection-xD9OhyOP", defects: [ "CSCwj94682", ], discovery: "EXTERNAL", }, title: "Cisco NX-OS Software CLI Command Injection Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2024-20399", datePublished: "2024-07-01T16:11:44.028Z", dateReserved: "2023-11-08T15:08:07.660Z", dateUpdated: "2024-09-17T18:07:44.853Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.