ID

VAR-201711-0331


CVE

CVE-2017-12336


TITLE

Cisco NX-OS System software input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-010556

DESCRIPTION

A vulnerability in the TCL scripting subsystem of Cisco NX-OS System Software could allow an authenticated, local attacker to escape the interactive TCL shell and gain unauthorized access to the underlying operating system of the device. The vulnerability exists due to insufficient input validation of user-supplied files passed to the interactive TCL shell of the affected device. An attacker could exploit this vulnerability to escape the scripting sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. To exploit this vulnerability, an attacker must have local access and be authenticated to the targeted device with administrative or tclsh execution privileges. This vulnerability affects the following products running Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, Unified Computing System Manager. Cisco Bug IDs: CSCve93750, CSCve93762, CSCve93763, CSCvg04127. Cisco NX-OS System software contains a vulnerability related to input validation. Vendors have confirmed this vulnerability Bug ID CSCve93750 , CSCve93762 , CSCve93763 ,and CSCvg04127 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco MultilayerDirectorSwitches, etc. are products of Cisco. Cisco MultilayerDirectorSwitches is a switch product. Nexus2000 SeriesFabricExtenders is a Nexus2000 Series Array Extender. NX-OSSystemSoftware is a set of operating systems used in it. TCLscriptingsubsystem is one of the TCL scripting subsystems. The vulnerability is caused by the program not fully validating user-submitted files

Trust: 2.52

sources: NVD: CVE-2017-12336 // JVNDB: JVNDB-2017-010556 // CNVD: CNVD-2017-36138 // BID: 102168 // VULHUB: VHN-102848

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-36138

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:8.1\(0.59\)s0

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:8.1\(0\)bd\(0.20\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:8.1\(1\)s5

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:8.0\(1\)

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:7.0\(0\)hsk\(0.357\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)a8\(3\)

Trust: 1.6

vendor:ciscomodel:nx-osscope:eqversion:8.1\(0.2\)s0

Trust: 1.6

vendor:ciscomodel:nexus series switchesscope:eqversion:70000

Trust: 0.9

vendor:ciscomodel:nx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:unified computing systemscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus series switchescope:eqversion:3000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:5000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:6000

Trust: 0.6

vendor:ciscomodel:nexus series switches in nx-os modescope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:7700

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5600

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5500

Trust: 0.6

vendor:ciscomodel:nexus series fabric extendersscope:eqversion:2000

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:3500

Trust: 0.6

vendor:ciscomodel:multilayer director switchesscope: - version: -

Trust: 0.6

vendor:ciscomodel:unified computing system managerscope: - version: -

Trust: 0.6

vendor:ciscomodel:nexus r-series line cards and fabric modulesscope:eqversion:9500

Trust: 0.6

vendor:ciscomodel:unified computing system managerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:unified computing system 7.0 hskscope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os for nexus seriesscope:eqversion:77000

Trust: 0.3

vendor:ciscomodel:nx-os for nexus seriesscope:eqversion:70000

Trust: 0.3

vendor:ciscomodel:nexus r-series line cards and fabric modulesscope:eqversion:95000

Trust: 0.3

vendor:ciscomodel:nexus series switches standalone nx-os modescope:eqversion:9000-0

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:77000

Trust: 0.3

vendor:ciscomodel:nexus series switches 8.1 bdscope:eqversion:7000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:60000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:56000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:55000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:50000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:35000

Trust: 0.3

vendor:ciscomodel:nexus series switches 6.0 a8scope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:nexus series fabric extendersscope:eqversion:20000

Trust: 0.3

vendor:ciscomodel:multilayer director switchesscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2017-36138 // BID: 102168 // JVNDB: JVNDB-2017-010556 // CNNVD: CNNVD-201711-1228 // NVD: CVE-2017-12336

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12336
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-12336
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-36138
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201711-1228
value: MEDIUM

Trust: 0.6

VULHUB: VHN-102848
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-12336
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-36138
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-102848
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-12336
baseSeverity: MEDIUM
baseScore: 4.2
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 0.8
impactScore: 3.4
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-36138 // VULHUB: VHN-102848 // JVNDB: JVNDB-2017-010556 // CNNVD: CNNVD-201711-1228 // NVD: CVE-2017-12336

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-102848 // JVNDB: JVNDB-2017-010556 // NVD: CVE-2017-12336

THREAT TYPE

local

Trust: 0.9

sources: BID: 102168 // CNNVD: CNNVD-201711-1228

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201711-1228

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-010556

PATCH

title:cisco-sa-20171129-nxos5url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-nxos5

Trust: 0.8

title:A variety of Cisco products Cisco NX-OSSystemSoftwareTCL script subsystem security bypass vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/107773

Trust: 0.6

title:Multiple Cisco product Cisco NX-OS System Software TCL Fixes for script subsystem security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76846

Trust: 0.6

sources: CNVD: CNVD-2017-36138 // JVNDB: JVNDB-2017-010556 // CNNVD: CNNVD-201711-1228

EXTERNAL IDS

db:NVDid:CVE-2017-12336

Trust: 3.4

db:BIDid:102168

Trust: 1.4

db:SECTRACKid:1039936

Trust: 1.1

db:JVNDBid:JVNDB-2017-010556

Trust: 0.8

db:CNNVDid:CNNVD-201711-1228

Trust: 0.7

db:CNVDid:CNVD-2017-36138

Trust: 0.6

db:VULHUBid:VHN-102848

Trust: 0.1

sources: CNVD: CNVD-2017-36138 // VULHUB: VHN-102848 // BID: 102168 // JVNDB: JVNDB-2017-010556 // CNNVD: CNNVD-201711-1228 // NVD: CVE-2017-12336

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171129-nxos5

Trust: 2.6

url:http://www.securityfocus.com/bid/102168

Trust: 1.1

url:http://www.securitytracker.com/id/1039936

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12336

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-12336

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2017-36138 // VULHUB: VHN-102848 // BID: 102168 // JVNDB: JVNDB-2017-010556 // CNNVD: CNNVD-201711-1228 // NVD: CVE-2017-12336

CREDITS

The vendor has reported this issue.

Trust: 0.3

sources: BID: 102168

SOURCES

db:CNVDid:CNVD-2017-36138
db:VULHUBid:VHN-102848
db:BIDid:102168
db:JVNDBid:JVNDB-2017-010556
db:CNNVDid:CNNVD-201711-1228
db:NVDid:CVE-2017-12336

LAST UPDATE DATE

2024-11-23T23:12:18.382000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-36138date:2017-12-05T00:00:00
db:VULHUBid:VHN-102848date:2017-12-15T00:00:00
db:BIDid:102168date:2017-12-19T22:01:00
db:JVNDBid:JVNDB-2017-010556date:2017-12-19T00:00:00
db:CNNVDid:CNNVD-201711-1228date:2017-12-01T00:00:00
db:NVDid:CVE-2017-12336date:2024-11-21T03:09:19.857

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-36138date:2017-12-05T00:00:00
db:VULHUBid:VHN-102848date:2017-11-30T00:00:00
db:BIDid:102168date:2017-11-29T00:00:00
db:JVNDBid:JVNDB-2017-010556date:2017-12-19T00:00:00
db:CNNVDid:CNNVD-201711-1228date:2017-12-01T00:00:00
db:NVDid:CVE-2017-12336date:2017-11-30T09:29:00.540