7.8

CVE-2023-20050

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user.

Data is provided by the National Vulnerability Database (NVD)
CiscoNx-os Version-
   CiscoMds 9000 Version-
   CiscoMds 9100 Version-
   CiscoMds 9132t Version-
   CiscoMds 9134 Version-
   CiscoMds 9140 Version-
   CiscoMds 9148 Version-
   CiscoMds 9148s Version-
   CiscoMds 9148t Version-
   CiscoMds 9200 Version-
   CiscoMds 9216 Version-
   CiscoMds 9216a Version-
   CiscoMds 9216i Version-
   CiscoMds 9222i Version-
   CiscoMds 9250i Version-
   CiscoMds 9396s Version-
   CiscoMds 9396t Version-
   CiscoMds 9500 Version-
   CiscoMds 9506 Version-
   CiscoMds 9509 Version-
   CiscoMds 9513 Version-
   CiscoMds 9700 Version-
   CiscoMds 9706 Version-
   CiscoMds 9710 Version-
   CiscoMds 9718 Version-
   CiscoNexus 1000 Virtual Edge Version- SwPlatformvmware_vsphere
   CiscoNexus 1000v Version- SwPlatformhyper-v
   CiscoNexus 1000v Version- SwPlatformmicrosoft_hyper-v
   CiscoNexus 5500 Version-
   CiscoNexus 5548p Version-
   CiscoNexus 5548up Version-
   CiscoNexus 5596t Version-
   CiscoNexus 5596up Version-
   CiscoNexus 5600 Version-
   CiscoNexus 56128p Version-
   CiscoNexus 5624q Version-
   CiscoNexus 5648q Version-
   CiscoNexus 5672up Version-
   CiscoNexus 5672up-16g Version-
   CiscoNexus 5696q Version-
   CiscoNexus 6000 Version-
   CiscoNexus 6001 Version-
   CiscoNexus 6001p Version-
   CiscoNexus 6001t Version-
   CiscoNexus 6004 Version-
   CiscoNexus 6004x Version-
CiscoNx-os Version < 8.2\(9\)
   CiscoNexus 7000 Version-
   CiscoNexus 7004 Version-
   CiscoNexus 7009 Version-
   CiscoNexus 7010 Version-
   CiscoNexus 7018 Version-
   CiscoNexus 7700 Version-
   CiscoNexus 7702 Version-
   CiscoNexus 7706 Version-
   CiscoNexus 7710 Version-
   CiscoNexus 7718 Version-
CiscoNx-os Version < 9.3\(10\)
   CiscoNexus 3016 Version-
   CiscoNexus 3016q Version-
   CiscoNexus 3048 Version-
   CiscoNexus 3064 Version-
   CiscoNexus 3064-32t Version-
   CiscoNexus 3064-t Version-
   CiscoNexus 3064-x Version-
   CiscoNexus 3064t Version-
   CiscoNexus 3064x Version-
   CiscoNexus 3100 Version-
   CiscoNexus 3100-v Version-
   CiscoNexus 3100-z Version-
   CiscoNexus 3100v Version-
   CiscoNexus 31108pc-v Version-
   CiscoNexus 31108pv-v Version-
   CiscoNexus 31108tc-v Version-
   CiscoNexus 31128pq Version-
   CiscoNexus 3132c-z Version-
   CiscoNexus 3132q Version-
   CiscoNexus 3132q-v Version-
   CiscoNexus 3132q-x Version-
   CiscoNexus 3132q-x/3132q-xl Version-
   CiscoNexus 3132q-xl Version-
   CiscoNexus 3164q Version-
   CiscoNexus 3172 Version-
   CiscoNexus 3172pq Version-
   CiscoNexus 3172pq-xl Version-
   CiscoNexus 3172pq/pq-xl Version-
   CiscoNexus 3172tq Version-
   CiscoNexus 3172tq-32t Version-
   CiscoNexus 3172tq-xl Version-
   CiscoNexus 3200 Version-
   CiscoNexus 3232c Version-
   CiscoNexus 3232c Version-
   CiscoNexus 3264c-e Version-
   CiscoNexus 3264q Version-
   CiscoNexus 3400 Version-
   CiscoNexus 3408-s Version-
   CiscoNexus 34180yc Version-
   CiscoNexus 34200yc-sm Version-
   CiscoNexus 3432d-s Version-
   CiscoNexus 3464c Version-
   CiscoNexus 3500 Version-
   CiscoNexus 3524 Version-
   CiscoNexus 3524-x Version-
   CiscoNexus 3524-x/xl Version-
   CiscoNexus 3524-xl Version-
   CiscoNexus 3548 Version-
   CiscoNexus 3548-x Version-
   CiscoNexus 3548-x/xl Version-
   CiscoNexus 3548-xl Version-
   CiscoNexus 3600 Version-
   CiscoNexus 36180yc-r Version-
   CiscoNexus 3636c-r Version-
   CiscoNexus 9000 Version-
   CiscoNexus 9000v Version-
CiscoNx-os Version < 10.2\(4\)
   CiscoNexus 3016 Version-
   CiscoNexus 3016q Version-
   CiscoNexus 3048 Version-
   CiscoNexus 3064 Version-
   CiscoNexus 3064-32t Version-
   CiscoNexus 3064-t Version-
   CiscoNexus 3064-x Version-
   CiscoNexus 3064t Version-
   CiscoNexus 3064x Version-
   CiscoNexus 3100 Version-
   CiscoNexus 3100-v Version-
   CiscoNexus 3100-z Version-
   CiscoNexus 3100v Version-
   CiscoNexus 31108pc-v Version-
   CiscoNexus 31108pv-v Version-
   CiscoNexus 31108tc-v Version-
   CiscoNexus 31128pq Version-
   CiscoNexus 3132c-z Version-
   CiscoNexus 3132q Version-
   CiscoNexus 3132q-v Version-
   CiscoNexus 3132q-x Version-
   CiscoNexus 3132q-x/3132q-xl Version-
   CiscoNexus 3132q-xl Version-
   CiscoNexus 3164q Version-
   CiscoNexus 3172 Version-
   CiscoNexus 3172pq Version-
   CiscoNexus 3172pq-xl Version-
   CiscoNexus 3172pq/pq-xl Version-
   CiscoNexus 3172tq Version-
   CiscoNexus 3172tq-32t Version-
   CiscoNexus 3172tq-xl Version-
   CiscoNexus 3200 Version-
   CiscoNexus 3232c Version-
   CiscoNexus 3232c Version-
   CiscoNexus 3264c-e Version-
   CiscoNexus 3264q Version-
   CiscoNexus 3400 Version-
   CiscoNexus 3408-s Version-
   CiscoNexus 34180yc Version-
   CiscoNexus 34200yc-sm Version-
   CiscoNexus 3432d-s Version-
   CiscoNexus 3464c Version-
   CiscoNexus 3500 Version-
   CiscoNexus 3524 Version-
   CiscoNexus 3524-x Version-
   CiscoNexus 3524-x/xl Version-
   CiscoNexus 3524-xl Version-
   CiscoNexus 3548 Version-
   CiscoNexus 3548-x Version-
   CiscoNexus 3548-x/xl Version-
   CiscoNexus 3548-xl Version-
   CiscoNexus 3600 Version-
   CiscoNexus 36180yc-r Version-
   CiscoNexus 3636c-r Version-
   CiscoNexus 9000 Version-
   CiscoNexus 9000v Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.06% 0.205
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
psirt@cisco.com 4.4 1.8 2.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.