ID

VAR-201806-1030


CVE

CVE-2018-0301


TITLE

Cisco NX-OS Software Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-006892

DESCRIPTION

A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to craft a packet to the management interface on an affected system, causing a buffer overflow. The vulnerability is due to incorrect input validation in the authentication module of the NX-API subsystem. An attacker could exploit this vulnerability by sending a crafted HTTP or HTTPS packet to the management interface of an affected system with the NX-API feature enabled. An exploit could allow the attacker to execute arbitrary code as root. Note: NX-API is disabled by default. This vulnerability affects: MDS 9000 Series Multilayer Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvd45804, CSCve02322, CSCve02412. Vendors have confirmed this vulnerability Bug ID CSCvd45804 , CSCve02322 ,and CSCve02412 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. are products of Cisco. are all switch devices. FabricModules is a switch matrix module. NX-OSSoftware is the data center-level operating system software used by a set of switches running on it

Trust: 2.61

sources: NVD: CVE-2018-0301 // JVNDB: JVNDB-2018-006892 // CNVD: CNVD-2018-11961 // BID: 104512 // VULHUB: VHN-118503 // VULMON: CVE-2018-0301

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-11961

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:7.2

Trust: 1.3

vendor:ciscomodel:nx-osscope:eqversion:7.0

Trust: 1.3

vendor:ciscomodel:nx-osscope:ltversion:7.0\(3\)i4

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:7.0\(3\)i5

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.3\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.2

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:5.2

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:6.0

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:6.0

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:7.2

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.3\(2\)d1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:8.1

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:7.3

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:8.1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(3\)i7

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:8.2

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.0\(3\)i7\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.1

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:8.0

Trust: 1.0

vendor:ciscomodel:nx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus series switchescope:eqversion:3000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:7000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:6000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:7700

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5600

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5500

Trust: 0.6

vendor:ciscomodel:nexus series fabric extendersscope:eqversion:2000

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:3500

Trust: 0.6

vendor:ciscomodel:nexus r-series line cards and fabric modulesscope:eqversion:9500

Trust: 0.6

vendor:ciscomodel:mds series multilayer switchesscope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1a\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)u1\(1\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2a\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1c\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(2b\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n1\(1b\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:5.0\(3\)n2\(1\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:7.3

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i6scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i5scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i4scope: - version: -

Trust: 0.3

vendor:ciscomodel:nexus r-series line cards and fabric modulesscope:eqversion:95000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:77000

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:70000

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:60000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:56000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:56000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:55000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:35000

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:nexusscope:eqversion:20000

Trust: 0.3

vendor:ciscomodel:mds nx-osscope:eqversion:9000-

Trust: 0.3

sources: CNVD: CNVD-2018-11961 // BID: 104512 // JVNDB: JVNDB-2018-006892 // CNNVD: CNNVD-201806-1051 // NVD: CVE-2018-0301

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0301
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-0301
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-11961
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201806-1051
value: CRITICAL

Trust: 0.6

VULHUB: VHN-118503
value: HIGH

Trust: 0.1

VULMON: CVE-2018-0301
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0301
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-11961
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118503
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0301
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-11961 // VULHUB: VHN-118503 // VULMON: CVE-2018-0301 // JVNDB: JVNDB-2018-006892 // CNNVD: CNNVD-201806-1051 // NVD: CVE-2018-0301

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-119

Trust: 1.1

sources: VULHUB: VHN-118503 // JVNDB: JVNDB-2018-006892 // NVD: CVE-2018-0301

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201806-1051

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201806-1051

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-006892

PATCH

title:cisco-sa-20180620-nxos-bourl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxos-bo

Trust: 0.8

title:Patches for several Cisco products NX-OSSoftware Remote Code Execution Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/132601

Trust: 0.6

title:Multiple Cisco product NX-OS Software Enter the fix for the verification vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=81116

Trust: 0.6

title:Cisco: Cisco NX-OS Software NX-API Arbitrary Code Execution Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180620-nxos-bo

Trust: 0.1

sources: CNVD: CNVD-2018-11961 // VULMON: CVE-2018-0301 // JVNDB: JVNDB-2018-006892 // CNNVD: CNNVD-201806-1051

EXTERNAL IDS

db:NVDid:CVE-2018-0301

Trust: 3.5

db:BIDid:104512

Trust: 2.7

db:SECTRACKid:1041169

Trust: 1.8

db:JVNDBid:JVNDB-2018-006892

Trust: 0.8

db:CNNVDid:CNNVD-201806-1051

Trust: 0.7

db:CNVDid:CNVD-2018-11961

Trust: 0.6

db:VULHUBid:VHN-118503

Trust: 0.1

db:VULMONid:CVE-2018-0301

Trust: 0.1

sources: CNVD: CNVD-2018-11961 // VULHUB: VHN-118503 // VULMON: CVE-2018-0301 // BID: 104512 // JVNDB: JVNDB-2018-006892 // CNNVD: CNNVD-201806-1051 // NVD: CVE-2018-0301

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180620-nxos-bo

Trust: 2.8

url:http://www.securityfocus.com/bid/104512

Trust: 1.9

url:http://www.securitytracker.com/id/1041169

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0301

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0301

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2018-11961 // VULHUB: VHN-118503 // VULMON: CVE-2018-0301 // BID: 104512 // JVNDB: JVNDB-2018-006892 // CNNVD: CNNVD-201806-1051 // NVD: CVE-2018-0301

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 104512

SOURCES

db:CNVDid:CNVD-2018-11961
db:VULHUBid:VHN-118503
db:VULMONid:CVE-2018-0301
db:BIDid:104512
db:JVNDBid:JVNDB-2018-006892
db:CNNVDid:CNNVD-201806-1051
db:NVDid:CVE-2018-0301

LAST UPDATE DATE

2024-11-23T21:38:49.066000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-11961date:2018-06-23T00:00:00
db:VULHUBid:VHN-118503date:2019-10-09T00:00:00
db:VULMONid:CVE-2018-0301date:2019-10-09T00:00:00
db:BIDid:104512date:2018-06-20T00:00:00
db:JVNDBid:JVNDB-2018-006892date:2018-09-04T00:00:00
db:CNNVDid:CNNVD-201806-1051date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0301date:2024-11-21T03:37:55.867

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-11961date:2018-06-23T00:00:00
db:VULHUBid:VHN-118503date:2018-06-20T00:00:00
db:VULMONid:CVE-2018-0301date:2018-06-20T00:00:00
db:BIDid:104512date:2018-06-20T00:00:00
db:JVNDBid:JVNDB-2018-006892date:2018-09-04T00:00:00
db:CNNVDid:CNNVD-201806-1051date:2018-06-21T00:00:00
db:NVDid:CVE-2018-0301date:2018-06-20T21:29:00.483