Description
A vulnerability in the Virtual Shell (VSH) session management for Cisco NX-OS Software could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in to the device using the remote management connection.
Published: 2019-08-28
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-10522 A vulnerability in the Virtual Shell (VSH) session management for Cisco NX-OS Software could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in to the device using the remote management connection.
History

Thu, 21 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cisco 7000 10-slot 7000 18-slot 7000 4-slot 7000 9-slot 7700 10-slot 7700 18-slot 7700 2-slot 7700 6-slot Mds 9132t Mds 9148s Mds 9148t Mds 9216 Mds 9216a Mds 9216i Mds 9222i Mds 9250i Mds 9396s Mds 9396t Mds 9506 Mds 9509 Mds 9513 Mds 9706 Mds 9710 Mds 9718 N77-f312ck-26 N77-f324fq-25 N77-f348xp-23 N77-f430cq-36 N77-m312cq-26l N77-m324fq-25l N77-m348xp-23l N7k-f248xp-25e N7k-f306ck-25 N7k-f312fq-25 N7k-m202cf-22l N7k-m206fq-23l N7k-m224xp-23l N7k-m324fq-25l N7k-m348xp-25l N9k-c92160yc-x N9k-c9236c N9k-c9272q N9k-c93180lc-ex N9k-c93180yc-ex N9k-c93180yc-fx N9k-c9504-fm-r N9k-c9508-fm-r N9k-x96136yc-r N9k-x9636c-r N9k-x9636c-rx N9k-x9636q-r N9k-x9732c-ex N9k-x9736c-fx Nexus 3048 Nexus 3524-x\/xl Nexus 3548-x\/xl Nexus 36180yc-r Nexus 3636c-r Nexus 5010 Nexus 5020 Nexus 5548p Nexus 5548up Nexus 5596t Nexus 5596up Nexus 56128p Nexus 5624q Nexus 5648q Nexus 5672up Nexus 5672up-16g Nexus 5696q Nexus 6001 Nexus 6004 Nexus 7000 Supervisor 1 Nexus 7000 Supervisor 2 Nexus 7000 Supervisor 2e Nexus 7700 Supervisor 2e Nexus 7700 Supervisor 3e Nx-os Ucs-6296up Ucs 6248up Ucs 6324 Ucs 6332 Ucs 6332-16up X96136yc-r X9636c-r X9636c-rx X9636q-r
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-21T19:15:13.546Z

Reserved: 2018-12-06T00:00:00.000Z

Link: CVE-2019-1965

cve-icon Vulnrichment

Updated: 2024-08-04T18:35:51.782Z

cve-icon NVD

Status : Modified

Published: 2019-08-28T19:15:11.053

Modified: 2024-11-21T04:37:47.067

Link: CVE-2019-1965

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses