ID

VAR-201507-0520


CVE

CVE-2015-4232


TITLE

Cisco Nexus and MDS 9000 Run on device Cisco NX-OS In any OS Command execution vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2015-003467

DESCRIPTION

Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856. Cisco Nexus and MDS 9000 Run on device Cisco NX-OS Any OS A command execution vulnerability exists. Nexus is Cisco's line of network switches designed for data centers. On the command line interpreter of the Cisco Nexus device, the parameter input filtering of the tar command is invalid. There are multiple privilege escalation vulnerabilities. An authenticated local attacker can use this vulnerability to gain elevated privileges and execute arbitrary commands on the underlying operating system. Cisco NX-OS software is a data center-level operating system that reflects modular design, resiliency, and maintainability. Cisco NX-OS Software for Nexus Series is prone to a local privilege-escalation vulnerability. This issue is being tracked by Cisco Bug ID CSCus44856

Trust: 3.06

sources: NVD: CVE-2015-4232 // JVNDB: JVNDB-2015-003467 // CNVD: CNVD-2015-04196 // CNVD: CNVD-2015-04580 // BID: 75503 // VULHUB: VHN-82193

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 1.2

sources: CNVD: CNVD-2015-04196 // CNVD: CNVD-2015-04580

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:6.2\(10\)

Trust: 1.6

vendor:ciscomodel:mds 9100 seriesscope: - version: -

Trust: 0.8

vendor:ciscomodel:mds 9200 seriesscope: - version: -

Trust: 0.8

vendor:ciscomodel:mds 9500scope: - version: -

Trust: 0.8

vendor:ciscomodel:mds 9700scope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 93120tx switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 93128tx switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9332pq switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9336pq aci spini switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9372px switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9372tx switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9396px switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9396tx switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9504 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9508 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9516 switchscope: - version: -

Trust: 0.8

vendor:ciscomodel:nx-osscope:eqversion:6.2(10)

Trust: 0.8

vendor:ciscomodel:mds nx-os softwarescope:eqversion:9000>=6.2(10)

Trust: 0.6

vendor:ciscomodel:nexus nx-os softwarescope:gteversion:6.2(10)

Trust: 0.6

vendor:ciscomodel:nx-os 6.2 (on nexus and mdsscope:eqversion:9000)

Trust: 0.6

vendor:ciscomodel:nx-os software for nexus seriesscope:eqversion:70006.2(10)

Trust: 0.3

sources: CNVD: CNVD-2015-04196 // CNVD: CNVD-2015-04580 // BID: 75503 // JVNDB: JVNDB-2015-003467 // CNNVD: CNNVD-201507-091 // NVD: CVE-2015-4232

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-4232
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-4232
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-04196
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2015-04580
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201507-091
value: MEDIUM

Trust: 0.6

VULHUB: VHN-82193
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-4232
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-04196
severity: MEDIUM
baseScore: 4.3
vectorString: AV:L/AC:L/AU:S/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2015-04580
severity: MEDIUM
baseScore: 4.3
vectorString: AV:L/AC:L/AU:S/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-82193
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-04196 // CNVD: CNVD-2015-04580 // VULHUB: VHN-82193 // JVNDB: JVNDB-2015-003467 // CNNVD: CNNVD-201507-091 // NVD: CVE-2015-4232

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-82193 // JVNDB: JVNDB-2015-003467 // NVD: CVE-2015-4232

THREAT TYPE

local

Trust: 0.9

sources: BID: 75503 // CNNVD: CNNVD-201507-091

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201507-091

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003467

PATCH

title:39569url:http://tools.cisco.com/security/center/viewAlert.x?alertId=39569

Trust: 0.8

title:Patch for Cisco Nexus Device NS-OS Software Command Line Interpreter Local Privilege Escalation Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/60299

Trust: 0.6

title:Patch for Cisco NX-OS 'tar' Command Verify Privilege Escalation Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/60928

Trust: 0.6

sources: CNVD: CNVD-2015-04196 // CNVD: CNVD-2015-04580 // JVNDB: JVNDB-2015-003467

EXTERNAL IDS

db:NVDid:CVE-2015-4232

Trust: 4.0

db:BIDid:75503

Trust: 2.0

db:SECTRACKid:1032764

Trust: 1.1

db:JVNDBid:JVNDB-2015-003467

Trust: 0.8

db:CNNVDid:CNNVD-201507-091

Trust: 0.7

db:CNVDid:CNVD-2015-04196

Trust: 0.6

db:CNVDid:CNVD-2015-04580

Trust: 0.6

db:VULHUBid:VHN-82193

Trust: 0.1

sources: CNVD: CNVD-2015-04196 // CNVD: CNVD-2015-04580 // VULHUB: VHN-82193 // BID: 75503 // JVNDB: JVNDB-2015-003467 // CNNVD: CNNVD-201507-091 // NVD: CVE-2015-4232

REFERENCES

url:http://tools.cisco.com/security/center/viewalert.x?alertid=39569

Trust: 3.2

url:http://www.securityfocus.com/bid/75503

Trust: 1.1

url:http://www.securitytracker.com/id/1032764

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4232

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4232

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2015-04196 // CNVD: CNVD-2015-04580 // VULHUB: VHN-82193 // BID: 75503 // JVNDB: JVNDB-2015-003467 // CNNVD: CNNVD-201507-091 // NVD: CVE-2015-4232

CREDITS

Jens Krabbenhoeft

Trust: 0.3

sources: BID: 75503

SOURCES

db:CNVDid:CNVD-2015-04196
db:CNVDid:CNVD-2015-04580
db:VULHUBid:VHN-82193
db:BIDid:75503
db:JVNDBid:JVNDB-2015-003467
db:CNNVDid:CNNVD-201507-091
db:NVDid:CVE-2015-4232

LAST UPDATE DATE

2024-11-23T23:09:14.867000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-04196date:2015-07-03T00:00:00
db:CNVDid:CNVD-2015-04580date:2015-07-16T00:00:00
db:VULHUBid:VHN-82193date:2016-12-28T00:00:00
db:BIDid:75503date:2015-06-30T00:00:00
db:JVNDBid:JVNDB-2015-003467date:2015-07-10T00:00:00
db:CNNVDid:CNNVD-201507-091date:2015-07-10T00:00:00
db:NVDid:CVE-2015-4232date:2024-11-21T02:30:40.970

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-04196date:2015-07-03T00:00:00
db:CNVDid:CNVD-2015-04580date:2015-07-16T00:00:00
db:VULHUBid:VHN-82193date:2015-07-03T00:00:00
db:BIDid:75503date:2015-06-30T00:00:00
db:JVNDBid:JVNDB-2015-003467date:2015-07-10T00:00:00
db:CNNVDid:CNNVD-201507-091date:2015-07-06T00:00:00
db:NVDid:CVE-2015-4232date:2015-07-03T10:59:01.343