9

CVE-2018-0313

A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to send a malicious packet to the management interface on an affected system and execute a command-injection exploit. The vulnerability is due to incorrect input validation of user-supplied data to the NX-API subsystem. An attacker could exploit this vulnerability by sending a malicious HTTP or HTTPS packet to the management interface of an affected system that has the NX-API feature enabled. A successful exploit could allow the attacker to execute arbitrary commands with root privileges. Note: NX-API is disabled by default. This vulnerability affects MDS 9000 Series Multilayer Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvd47415, CSCve03216, CSCve03224, CSCve03234.

Data is provided by the National Vulnerability Database (NVD)
CiscoNx-os Version7.0(0)hsk(0.357)
   CiscoNexus 5000 Version-
   CiscoNexus 5010 Version-
   CiscoNexus 5020 Version-
   CiscoNexus 5548p Version-
   CiscoNexus 5548up Version-
   CiscoNexus 5596t Version-
   CiscoNexus 5596up Version-
   CiscoNexus 56128p Version-
   CiscoNexus 5624q Version-
   CiscoNexus 5648q Version-
   CiscoNexus 5672up Version-
   CiscoNexus 5696q Version-
CiscoNx-os Version8.0(1)s20
   CiscoNexus 7000 Version-
   CiscoNexus 7700 Version-
CiscoNx-os Version8.1(0)bd(0.20)
   CiscoNexus 7000 Version-
   CiscoNexus 7700 Version-
CiscoNx-os Version8.1(0.97)s0
   CiscoNexus 7000 Version-
   CiscoNexus 7700 Version-
CiscoNx-os Version8.1(0)bd(0.20)
   CiscoNexus 92160yc-x Version-
   CiscoNexus 92304qc Version-
   CiscoNexus 9236c Version-
   CiscoNexus 9272q Version-
   CiscoNexus 93108tc-ex Version-
   CiscoNexus 93120tx Version-
   CiscoNexus 93128tx Version-
   CiscoNexus 93180yc-ex Version-
   CiscoNexus 9332pq Version-
   CiscoNexus 9372px Version-
   CiscoNexus 9372tx Version-
   CiscoNexus 9396px Version-
   CiscoNexus 9396tx Version-
   CiscoNexus 9504 Version-
   CiscoNexus 9508 Version-
   CiscoNexus 9516 Version-
   CiscoNexus N9k-c9508-fm-r Version-
   CiscoNexus N9k-x9636c-r Version-
   CiscoNexus N9k-x9636q-r Version-
CiscoNx-os Version8.1(1)s5
   CiscoNexus 92160yc-x Version-
   CiscoNexus 92304qc Version-
   CiscoNexus 9236c Version-
   CiscoNexus 9272q Version-
   CiscoNexus 93108tc-ex Version-
   CiscoNexus 93120tx Version-
   CiscoNexus 93128tx Version-
   CiscoNexus 93180yc-ex Version-
   CiscoNexus 9332pq Version-
   CiscoNexus 9372px Version-
   CiscoNexus 9372tx Version-
   CiscoNexus 9396px Version-
   CiscoNexus 9396tx Version-
   CiscoNexus 9504 Version-
   CiscoNexus 9508 Version-
   CiscoNexus 9516 Version-
   CiscoNexus N9k-c9508-fm-r Version-
   CiscoNexus N9k-x9636c-r Version-
   CiscoNexus N9k-x9636q-r Version-
CiscoNx-os Version-
   CiscoNexus 172tq-xl Version-
   CiscoNexus 3016 Version-
   CiscoNexus 3048 Version-
   CiscoNexus 3064-32t Version-
   CiscoNexus 3064-t Version-
   CiscoNexus 3064-x Version-
   CiscoNexus 3100-v Version-
   CiscoNexus 31128pq Version-
   CiscoNexus 3132c-z Version-
   CiscoNexus 3132q Version-
   CiscoNexus 3132q-x Version-
   CiscoNexus 3132q-xl Version-
   CiscoNexus 3164q Version-
   CiscoNexus 3172pq Version-
   CiscoNexus 3172pq-xl Version-
   CiscoNexus 3172tq Version-
   CiscoNexus 3172tq-32t Version-
   CiscoNexus 3232c Version-
   CiscoNexus 3264c-e Version-
   CiscoNexus 3264q Version-
   CiscoNexus 34180yc Version-
   CiscoNexus 3524-x Version-
   CiscoNexus 3524-xl Version-
   CiscoNexus 3548 Version-
   CiscoNexus 3548-x Version-
   CiscoNexus 3548-xl Version-
   CiscoNexus 3636c-r Version-
   CiscoNexus C36180yc-r Version-
CiscoNx-os Version-
   CiscoNexus 2148t Version-
   CiscoNexus 2224tp Ge Version-
   CiscoNexus 2232pp 10ge Version-
   CiscoNexus 2232tm-e 10ge Version-
   CiscoNexus 2232tm 10ge Version-
   CiscoNexus 2248pq 10ge Version-
   CiscoNexus 2248tp-e Version-
   CiscoNexus 2248tp Ge Version-
CiscoNx-os Version-
   CiscoNexus 6001p Version-
   CiscoNexus 6001t Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.8% 0.731
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9 8 10
AV:N/AC:L/Au:S/C:C/I:C/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.