7.2
CVE-2019-1769
- EPSS 0.08%
- Published 15.05.2019 20:29:00
- Last modified 21.11.2024 04:37:20
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands on the underlying Linux operating system of an attached line card with the privilege level of root. The vulnerability is due to insufficient validation of arguments passed to a specific CLI command on the affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system of an attached line card with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Nx-os Version < 7.0\(3\)i7\(6\)
Cisco ≫ Nexus 3016 Version-
Cisco ≫ Nexus 3048 Version-
Cisco ≫ Nexus 3064 Version-
Cisco ≫ Nexus 3064-t Version-
Cisco ≫ Nexus 31108pc-v Version-
Cisco ≫ Nexus 31108tc-v Version-
Cisco ≫ Nexus 31128pq Version-
Cisco ≫ Nexus 3132c-z Version-
Cisco ≫ Nexus 3132q Version-
Cisco ≫ Nexus 3132q-v Version-
Cisco ≫ Nexus 3132q-xl Version-
Cisco ≫ Nexus 3164q Version-
Cisco ≫ Nexus 3172 Version-
Cisco ≫ Nexus 3172pq-xl Version-
Cisco ≫ Nexus 3172tq Version-
Cisco ≫ Nexus 3172tq-32t Version-
Cisco ≫ Nexus 3172tq-xl Version-
Cisco ≫ Nexus 3232c Version-
Cisco ≫ Nexus 3264c-e Version-
Cisco ≫ Nexus 3264q Version-
Cisco ≫ Nexus 34180yc Version-
Cisco ≫ Nexus 3464c Version-
Cisco ≫ Nexus 3524 Version-
Cisco ≫ Nexus 3524-x Version-
Cisco ≫ Nexus 3524-x/xl Version-
Cisco ≫ Nexus 3524-xl Version-
Cisco ≫ Nexus 3548 Version-
Cisco ≫ Nexus 3548-x Version-
Cisco ≫ Nexus 3548-x/xl Version-
Cisco ≫ Nexus 3548-xl Version-
Cisco ≫ Nexus 36180yc-r Version-
Cisco ≫ Nexus 3636c-r Version-
Cisco ≫ Nexus 9200yc Version-
Cisco ≫ Nexus 92304qc Version-
Cisco ≫ Nexus 9236c Version-
Cisco ≫ Nexus 9272q Version-
Cisco ≫ Nexus 93108tc-ex Version-
Cisco ≫ Nexus 93108tc-fx Version-
Cisco ≫ Nexus 93120tx Version-
Cisco ≫ Nexus 93128tx Version-
Cisco ≫ Nexus 93180lc-ex Version-
Cisco ≫ Nexus 93180yc-ex Version-
Cisco ≫ Nexus 93180yc-fx Version-
Cisco ≫ Nexus 93240tc-fx2 Version-
Cisco ≫ Nexus 9332c Version-
Cisco ≫ Nexus 9332pq Version-
Cisco ≫ Nexus 9336pq Aci Version-
Cisco ≫ Nexus 9348gc-fxp Version-
Cisco ≫ Nexus 9372px Version-
Cisco ≫ Nexus 9372px-e Version-
Cisco ≫ Nexus 9372tx Version-
Cisco ≫ Nexus 9372tx-e Version-
Cisco ≫ Nexus 9396px Version-
Cisco ≫ Nexus 9396tx Version-
Cisco ≫ Nexus 9508 Version-
Cisco ≫ Nexus 9516 Version-
Cisco ≫ Nexus 3048 Version-
Cisco ≫ Nexus 3064 Version-
Cisco ≫ Nexus 3064-t Version-
Cisco ≫ Nexus 31108pc-v Version-
Cisco ≫ Nexus 31108tc-v Version-
Cisco ≫ Nexus 31128pq Version-
Cisco ≫ Nexus 3132c-z Version-
Cisco ≫ Nexus 3132q Version-
Cisco ≫ Nexus 3132q-v Version-
Cisco ≫ Nexus 3132q-xl Version-
Cisco ≫ Nexus 3164q Version-
Cisco ≫ Nexus 3172 Version-
Cisco ≫ Nexus 3172pq-xl Version-
Cisco ≫ Nexus 3172tq Version-
Cisco ≫ Nexus 3172tq-32t Version-
Cisco ≫ Nexus 3172tq-xl Version-
Cisco ≫ Nexus 3232c Version-
Cisco ≫ Nexus 3264c-e Version-
Cisco ≫ Nexus 3264q Version-
Cisco ≫ Nexus 34180yc Version-
Cisco ≫ Nexus 3464c Version-
Cisco ≫ Nexus 3524 Version-
Cisco ≫ Nexus 3524-x Version-
Cisco ≫ Nexus 3524-x/xl Version-
Cisco ≫ Nexus 3524-xl Version-
Cisco ≫ Nexus 3548 Version-
Cisco ≫ Nexus 3548-x Version-
Cisco ≫ Nexus 3548-x/xl Version-
Cisco ≫ Nexus 3548-xl Version-
Cisco ≫ Nexus 36180yc-r Version-
Cisco ≫ Nexus 3636c-r Version-
Cisco ≫ Nexus 9200yc Version-
Cisco ≫ Nexus 92304qc Version-
Cisco ≫ Nexus 9236c Version-
Cisco ≫ Nexus 9272q Version-
Cisco ≫ Nexus 93108tc-ex Version-
Cisco ≫ Nexus 93108tc-fx Version-
Cisco ≫ Nexus 93120tx Version-
Cisco ≫ Nexus 93128tx Version-
Cisco ≫ Nexus 93180lc-ex Version-
Cisco ≫ Nexus 93180yc-ex Version-
Cisco ≫ Nexus 93180yc-fx Version-
Cisco ≫ Nexus 93240tc-fx2 Version-
Cisco ≫ Nexus 9332c Version-
Cisco ≫ Nexus 9332pq Version-
Cisco ≫ Nexus 9336pq Aci Version-
Cisco ≫ Nexus 9348gc-fxp Version-
Cisco ≫ Nexus 9372px Version-
Cisco ≫ Nexus 9372px-e Version-
Cisco ≫ Nexus 9372tx Version-
Cisco ≫ Nexus 9372tx-e Version-
Cisco ≫ Nexus 9396px Version-
Cisco ≫ Nexus 9396tx Version-
Cisco ≫ Nexus 9508 Version-
Cisco ≫ Nexus 9516 Version-
Cisco ≫ Nx-os Version >= 7.0\(3\) < 7.0\(3\)f3\(5\)
Cisco ≫ N9k-c9504-fm-r Version-
Cisco ≫ N9k-c9508-fm-r Version-
Cisco ≫ N9k-x96136yc-r Version-
Cisco ≫ N9k-x9636c-r Version-
Cisco ≫ N9k-x9636c-rx Version-
Cisco ≫ N9k-x9636q-r Version-
Cisco ≫ Nexus 36180yc-r Version-
Cisco ≫ Nexus 3636c-r Version-
Cisco ≫ X96136yc-r Version-
Cisco ≫ X9636c-r Version-
Cisco ≫ X9636c-rx Version-
Cisco ≫ X9636q-r Version-
Cisco ≫ N9k-c9508-fm-r Version-
Cisco ≫ N9k-x96136yc-r Version-
Cisco ≫ N9k-x9636c-r Version-
Cisco ≫ N9k-x9636c-rx Version-
Cisco ≫ N9k-x9636q-r Version-
Cisco ≫ Nexus 36180yc-r Version-
Cisco ≫ Nexus 3636c-r Version-
Cisco ≫ X96136yc-r Version-
Cisco ≫ X9636c-r Version-
Cisco ≫ X9636c-rx Version-
Cisco ≫ X9636q-r Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.08% | 0.205 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.7 | 0.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
psirt@cisco.com | 6.7 | 0.8 | 5.9 |
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.