9
CVE-2018-0313
- EPSS 0.8%
- Published 21.06.2018 11:29:00
- Last modified 21.11.2024 03:37:57
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to send a malicious packet to the management interface on an affected system and execute a command-injection exploit. The vulnerability is due to incorrect input validation of user-supplied data to the NX-API subsystem. An attacker could exploit this vulnerability by sending a malicious HTTP or HTTPS packet to the management interface of an affected system that has the NX-API feature enabled. A successful exploit could allow the attacker to execute arbitrary commands with root privileges. Note: NX-API is disabled by default. This vulnerability affects MDS 9000 Series Multilayer Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvd47415, CSCve03216, CSCve03224, CSCve03234.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Nx-os Version7.0(0)hsk(0.357)
Cisco ≫ Nexus 5000 Version-
Cisco ≫ Nexus 5010 Version-
Cisco ≫ Nexus 5020 Version-
Cisco ≫ Nexus 5548p Version-
Cisco ≫ Nexus 5548up Version-
Cisco ≫ Nexus 5596t Version-
Cisco ≫ Nexus 5596up Version-
Cisco ≫ Nexus 56128p Version-
Cisco ≫ Nexus 5624q Version-
Cisco ≫ Nexus 5648q Version-
Cisco ≫ Nexus 5672up Version-
Cisco ≫ Nexus 5696q Version-
Cisco ≫ Nexus 5010 Version-
Cisco ≫ Nexus 5020 Version-
Cisco ≫ Nexus 5548p Version-
Cisco ≫ Nexus 5548up Version-
Cisco ≫ Nexus 5596t Version-
Cisco ≫ Nexus 5596up Version-
Cisco ≫ Nexus 56128p Version-
Cisco ≫ Nexus 5624q Version-
Cisco ≫ Nexus 5648q Version-
Cisco ≫ Nexus 5672up Version-
Cisco ≫ Nexus 5696q Version-
Cisco ≫ Nx-os Version8.1(0)bd(0.20)
Cisco ≫ Nexus 92160yc-x Version-
Cisco ≫ Nexus 92304qc Version-
Cisco ≫ Nexus 9236c Version-
Cisco ≫ Nexus 9272q Version-
Cisco ≫ Nexus 93108tc-ex Version-
Cisco ≫ Nexus 93120tx Version-
Cisco ≫ Nexus 93128tx Version-
Cisco ≫ Nexus 93180yc-ex Version-
Cisco ≫ Nexus 9332pq Version-
Cisco ≫ Nexus 9372px Version-
Cisco ≫ Nexus 9372tx Version-
Cisco ≫ Nexus 9396px Version-
Cisco ≫ Nexus 9396tx Version-
Cisco ≫ Nexus 9504 Version-
Cisco ≫ Nexus 9508 Version-
Cisco ≫ Nexus 9516 Version-
Cisco ≫ Nexus N9k-c9508-fm-r Version-
Cisco ≫ Nexus N9k-x9636c-r Version-
Cisco ≫ Nexus N9k-x9636q-r Version-
Cisco ≫ Nexus 92304qc Version-
Cisco ≫ Nexus 9236c Version-
Cisco ≫ Nexus 9272q Version-
Cisco ≫ Nexus 93108tc-ex Version-
Cisco ≫ Nexus 93120tx Version-
Cisco ≫ Nexus 93128tx Version-
Cisco ≫ Nexus 93180yc-ex Version-
Cisco ≫ Nexus 9332pq Version-
Cisco ≫ Nexus 9372px Version-
Cisco ≫ Nexus 9372tx Version-
Cisco ≫ Nexus 9396px Version-
Cisco ≫ Nexus 9396tx Version-
Cisco ≫ Nexus 9504 Version-
Cisco ≫ Nexus 9508 Version-
Cisco ≫ Nexus 9516 Version-
Cisco ≫ Nexus N9k-c9508-fm-r Version-
Cisco ≫ Nexus N9k-x9636c-r Version-
Cisco ≫ Nexus N9k-x9636q-r Version-
Cisco ≫ Nx-os Version8.1(1)s5
Cisco ≫ Nexus 92160yc-x Version-
Cisco ≫ Nexus 92304qc Version-
Cisco ≫ Nexus 9236c Version-
Cisco ≫ Nexus 9272q Version-
Cisco ≫ Nexus 93108tc-ex Version-
Cisco ≫ Nexus 93120tx Version-
Cisco ≫ Nexus 93128tx Version-
Cisco ≫ Nexus 93180yc-ex Version-
Cisco ≫ Nexus 9332pq Version-
Cisco ≫ Nexus 9372px Version-
Cisco ≫ Nexus 9372tx Version-
Cisco ≫ Nexus 9396px Version-
Cisco ≫ Nexus 9396tx Version-
Cisco ≫ Nexus 9504 Version-
Cisco ≫ Nexus 9508 Version-
Cisco ≫ Nexus 9516 Version-
Cisco ≫ Nexus N9k-c9508-fm-r Version-
Cisco ≫ Nexus N9k-x9636c-r Version-
Cisco ≫ Nexus N9k-x9636q-r Version-
Cisco ≫ Nexus 92304qc Version-
Cisco ≫ Nexus 9236c Version-
Cisco ≫ Nexus 9272q Version-
Cisco ≫ Nexus 93108tc-ex Version-
Cisco ≫ Nexus 93120tx Version-
Cisco ≫ Nexus 93128tx Version-
Cisco ≫ Nexus 93180yc-ex Version-
Cisco ≫ Nexus 9332pq Version-
Cisco ≫ Nexus 9372px Version-
Cisco ≫ Nexus 9372tx Version-
Cisco ≫ Nexus 9396px Version-
Cisco ≫ Nexus 9396tx Version-
Cisco ≫ Nexus 9504 Version-
Cisco ≫ Nexus 9508 Version-
Cisco ≫ Nexus 9516 Version-
Cisco ≫ Nexus N9k-c9508-fm-r Version-
Cisco ≫ Nexus N9k-x9636c-r Version-
Cisco ≫ Nexus N9k-x9636q-r Version-
Cisco ≫ Nx-os Version-
Cisco ≫ Nexus 172tq-xl Version-
Cisco ≫ Nexus 3016 Version-
Cisco ≫ Nexus 3048 Version-
Cisco ≫ Nexus 3064-32t Version-
Cisco ≫ Nexus 3064-t Version-
Cisco ≫ Nexus 3064-x Version-
Cisco ≫ Nexus 3100-v Version-
Cisco ≫ Nexus 31128pq Version-
Cisco ≫ Nexus 3132c-z Version-
Cisco ≫ Nexus 3132q Version-
Cisco ≫ Nexus 3132q-x Version-
Cisco ≫ Nexus 3132q-xl Version-
Cisco ≫ Nexus 3164q Version-
Cisco ≫ Nexus 3172pq Version-
Cisco ≫ Nexus 3172pq-xl Version-
Cisco ≫ Nexus 3172tq Version-
Cisco ≫ Nexus 3172tq-32t Version-
Cisco ≫ Nexus 3232c Version-
Cisco ≫ Nexus 3264c-e Version-
Cisco ≫ Nexus 3264q Version-
Cisco ≫ Nexus 34180yc Version-
Cisco ≫ Nexus 3524-x Version-
Cisco ≫ Nexus 3524-xl Version-
Cisco ≫ Nexus 3548 Version-
Cisco ≫ Nexus 3548-x Version-
Cisco ≫ Nexus 3548-xl Version-
Cisco ≫ Nexus 3636c-r Version-
Cisco ≫ Nexus C36180yc-r Version-
Cisco ≫ Nexus 3016 Version-
Cisco ≫ Nexus 3048 Version-
Cisco ≫ Nexus 3064-32t Version-
Cisco ≫ Nexus 3064-t Version-
Cisco ≫ Nexus 3064-x Version-
Cisco ≫ Nexus 3100-v Version-
Cisco ≫ Nexus 31128pq Version-
Cisco ≫ Nexus 3132c-z Version-
Cisco ≫ Nexus 3132q Version-
Cisco ≫ Nexus 3132q-x Version-
Cisco ≫ Nexus 3132q-xl Version-
Cisco ≫ Nexus 3164q Version-
Cisco ≫ Nexus 3172pq Version-
Cisco ≫ Nexus 3172pq-xl Version-
Cisco ≫ Nexus 3172tq Version-
Cisco ≫ Nexus 3172tq-32t Version-
Cisco ≫ Nexus 3232c Version-
Cisco ≫ Nexus 3264c-e Version-
Cisco ≫ Nexus 3264q Version-
Cisco ≫ Nexus 34180yc Version-
Cisco ≫ Nexus 3524-x Version-
Cisco ≫ Nexus 3524-xl Version-
Cisco ≫ Nexus 3548 Version-
Cisco ≫ Nexus 3548-x Version-
Cisco ≫ Nexus 3548-xl Version-
Cisco ≫ Nexus 3636c-r Version-
Cisco ≫ Nexus C36180yc-r Version-
Cisco ≫ Nx-os Version-
Cisco ≫ Nexus 2148t Version-
Cisco ≫ Nexus 2224tp Ge Version-
Cisco ≫ Nexus 2232pp 10ge Version-
Cisco ≫ Nexus 2232tm-e 10ge Version-
Cisco ≫ Nexus 2232tm 10ge Version-
Cisco ≫ Nexus 2248pq 10ge Version-
Cisco ≫ Nexus 2248tp-e Version-
Cisco ≫ Nexus 2248tp Ge Version-
Cisco ≫ Nexus 2224tp Ge Version-
Cisco ≫ Nexus 2232pp 10ge Version-
Cisco ≫ Nexus 2232tm-e 10ge Version-
Cisco ≫ Nexus 2232tm 10ge Version-
Cisco ≫ Nexus 2248pq 10ge Version-
Cisco ≫ Nexus 2248tp-e Version-
Cisco ≫ Nexus 2248tp Ge Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.8% | 0.731 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 9 | 8 | 10 |
AV:N/AC:L/Au:S/C:C/I:C/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.