Description
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(27) and 8.2(3). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(11) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9), 7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3).
Published: 2019-03-11
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-10170 A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(27) and 8.2(3). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(11) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9), 7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3).
History

Thu, 21 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cisco 9432pq 9536pq 9636pq 9736pq N3k-c31128pq-10ge N3k-c3132c-z N3k-c3164q-40ge N3k-c3264q N77-f312ck-26 N77-f324fq-25 N77-f348xp-23 N77-f430cq-36 N77-m312cq-26l N77-m324fq-25l N77-m348xp-23l N7k-f248xp-25e N7k-f306ck-25 N7k-f312fq-25 N7k-m202cf-22l N7k-m206fq-23l N7k-m224xp-23l N7k-m324fq-25l N7k-m348xp-25l N9k-x9432c-s N9k-x9464px N9k-x9464tx2 N9k-x9564px N9k-x9564tx N9k-x9636c-r N9k-x9636c-rx N9k-x97160yc-ex N9k-x9732c-ex N9k-x9732c-fx N9k-x9736c-ex N9k-x9736c-fx N9k-x9788tc-fx Nexus 92160yc-x Nexus 92300yc Nexus 92304qc Nexus 9236c Nexus 9272q Nexus 93108tc-ex Nexus 93108tc-fx Nexus 93120tx Nexus 9316d-gx Nexus 93180lc-ex Nexus 93180yc-ex Nexus 93180yc-fx Nexus 93240yc-fx2 Nexus 9332c Nexus 9336c-fx2 Nexus 9348gc-fxp Nexus 93600cd-gx Nexus 9364c Nexus 9504 Nexus 9508 Nexus 9516 Nx-os X9636q-r
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-21T19:42:56.484Z

Reserved: 2018-12-06T00:00:00.000Z

Link: CVE-2019-1613

cve-icon Vulnrichment

Updated: 2024-08-04T18:20:28.285Z

cve-icon NVD

Status : Modified

Published: 2019-03-11T21:29:00.840

Modified: 2024-11-21T04:36:55.777

Link: CVE-2019-1613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses