ID

VAR-201806-0991


CVE

CVE-2018-0306


TITLE

Cisco NX-OS Software command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-006808

DESCRIPTION

A vulnerability in the CLI parser of Cisco NX-OS Software could allow an authenticated, local attacker to perform a command-injection attack on an affected device. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by injecting malicious command arguments into a vulnerable CLI command. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the affected device. Note: This vulnerability requires that any feature license is uploaded to the device. The vulnerability does not require that the license be used. This vulnerability affects MDS 9000 Series Multilayer Switches, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 3600 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCve51693, CSCve91634, CSCve91659, CSCve91663. Cisco NX-OS The software contains a command injection vulnerability. Vendors have confirmed this vulnerability Bug ID CSCve51693 , CSCve91634 , CSCve91659 , CSCve91663 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CiscoMDS9000SeriesMultilayerSwitches and so on are all products of Cisco. Nexus2000 SeriesFabricExtenders is a Nexus2000 Series Switch Array Extender. NX-OSSoftware is the data center-level operating system software used by a set of switches running on it. CLIparser is one of the command line command parsers

Trust: 2.25

sources: NVD: CVE-2018-0306 // JVNDB: JVNDB-2018-006808 // CNVD: CNVD-2018-14570 // VULHUB: VHN-118508

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-14570

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:8.1\(0.59\)s0

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:5.2\(1\)sv3\(3.15\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:8.1\(1a\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:8.1\(0.2\)s0

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:8.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)a8\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.3\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:8.1\(0\)bd\(0.20\)

Trust: 1.0

vendor:ciscomodel:nx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus series switchesscope:eqversion:1000v

Trust: 0.6

vendor:ciscomodel:nexus series switchescope:eqversion:3000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:7000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:6000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:7700

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5600

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5500

Trust: 0.6

vendor:ciscomodel:nexus series fabric extendersscope:eqversion:2000

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:3500

Trust: 0.6

vendor:ciscomodel:nexus r-series line cards and fabric modulesscope:eqversion:9500

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:3600

Trust: 0.6

vendor:ciscomodel:mds series multilayer switchesscope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:nexus series cloud services platformsscope:eqversion:1100

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)sv3\(1.10\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)sv3\(1.5a\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.2\(3n\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(3\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)sv3\(1.6\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(3a\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)sv3\(1.3\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.2\(5\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)sv3\(1.5b\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.2\(1\)sv3\(1.1\)

Trust: 0.6

sources: CNVD: CNVD-2018-14570 // JVNDB: JVNDB-2018-006808 // CNNVD: CNNVD-201806-1124 // NVD: CVE-2018-0306

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0306
value: HIGH

Trust: 1.0

NVD: CVE-2018-0306
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-14570
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201806-1124
value: HIGH

Trust: 0.6

VULHUB: VHN-118508
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0306
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-14570
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118508
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0306
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2018-0306
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-14570 // VULHUB: VHN-118508 // JVNDB: JVNDB-2018-006808 // CNNVD: CNNVD-201806-1124 // NVD: CVE-2018-0306

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-20

Trust: 1.0

problemtype:CWE-77

Trust: 0.9

sources: VULHUB: VHN-118508 // JVNDB: JVNDB-2018-006808 // NVD: CVE-2018-0306

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201806-1124

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201806-1124

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-006808

PATCH

title:cisco-sa-20180620-nx-os-cli-executionurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-cli-execution

Trust: 0.8

title:Patches for various Cisco products NX-OSSoftwareCLI parser input validation vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/136269

Trust: 0.6

sources: CNVD: CNVD-2018-14570 // JVNDB: JVNDB-2018-006808

EXTERNAL IDS

db:NVDid:CVE-2018-0306

Trust: 3.1

db:SECTRACKid:1041169

Trust: 1.7

db:JVNDBid:JVNDB-2018-006808

Trust: 0.8

db:CNVDid:CNVD-2018-14570

Trust: 0.6

db:CNNVDid:CNNVD-201806-1124

Trust: 0.6

db:VULHUBid:VHN-118508

Trust: 0.1

sources: CNVD: CNVD-2018-14570 // VULHUB: VHN-118508 // JVNDB: JVNDB-2018-006808 // CNNVD: CNNVD-201806-1124 // NVD: CVE-2018-0306

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180620-nx-os-cli-execution

Trust: 2.3

url:http://www.securitytracker.com/id/1041169

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0306

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0306

Trust: 0.8

sources: CNVD: CNVD-2018-14570 // VULHUB: VHN-118508 // JVNDB: JVNDB-2018-006808 // CNNVD: CNNVD-201806-1124 // NVD: CVE-2018-0306

SOURCES

db:CNVDid:CNVD-2018-14570
db:VULHUBid:VHN-118508
db:JVNDBid:JVNDB-2018-006808
db:CNNVDid:CNNVD-201806-1124
db:NVDid:CVE-2018-0306

LAST UPDATE DATE

2024-11-23T21:38:48.797000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-14570date:2018-08-03T00:00:00
db:VULHUBid:VHN-118508date:2020-09-04T00:00:00
db:JVNDBid:JVNDB-2018-006808date:2018-08-31T00:00:00
db:CNNVDid:CNNVD-201806-1124date:2020-09-07T00:00:00
db:NVDid:CVE-2018-0306date:2024-11-21T03:37:56.550

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-14570date:2018-08-03T00:00:00
db:VULHUBid:VHN-118508date:2018-06-21T00:00:00
db:JVNDBid:JVNDB-2018-006808date:2018-08-31T00:00:00
db:CNNVDid:CNNVD-201806-1124date:2018-06-22T00:00:00
db:NVDid:CVE-2018-0306date:2018-06-21T11:29:00.523