ID

VAR-201903-0545


CVE

CVE-2019-1612


TITLE

Cisco NX-OS In software OS Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-002427

DESCRIPTION

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected running software versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Stand are affected running software versions prior to 7.0(3)F3(5). Cisco NX-OS The software includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Nexus 9500 R-Series Line Cards and Fabric Modules are all products of Cisco. Cisco Nexus 9500 R-Series Line Cards and Fabric Modules is a 9500R series line card module. Cisco NX-OS Software is a set of data center-level operating system software used by switches. Cisco NX-OS is prone to a local command-injection vulnerability. This issue is being tracked by Cisco Bug ID CSCvi42373 and CSCvj12009

Trust: 2.52

sources: NVD: CVE-2019-1612 // JVNDB: JVNDB-2019-002427 // CNVD: CNVD-2020-47610 // BID: 107388 // VULHUB: VHN-148234

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-47610

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:gteversion:7.0\(3\)f1

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:7.0\(3\)i5

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:7.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.0\(3\)i7\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:7.0\(3\)f3

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.0\(3\)f3\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus series switchescope:eqversion:3000

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:3500

Trust: 0.6

vendor:ciscomodel:nexus r-series line cards and fabric modulesscope:eqversion:9500

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:3600

Trust: 0.6

vendor:ciscomodel:nexus series switches in standalone nx-os modescope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:9.2

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i7scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i6scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i5scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i4scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 f3scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 f2scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 f1scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:7.0(3)

Trust: 0.3

vendor:ciscomodel:nx-os 6.0 a8scope: - version: -

Trust: 0.3

vendor:ciscomodel:nexus r-series line cards and fabric modulesscope:eqversion:95000

Trust: 0.3

vendor:ciscomodel:nexus series switches in standalone nx-os modescope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:36000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:35000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:nx-osscope:neversion:9.2(2)

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 f3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 6.0 a8scope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2020-47610 // BID: 107388 // JVNDB: JVNDB-2019-002427 // NVD: CVE-2019-1612

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1612
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1612
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1612
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-47610
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201903-149
value: MEDIUM

Trust: 0.6

VULHUB: VHN-148234
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-1612
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2020-47610
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-148234
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-1612
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.8

ykramarz@cisco.com: CVE-2019-1612
baseSeverity: MEDIUM
baseScore: 4.2
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 0.8
impactScore: 3.4
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2020-47610 // VULHUB: VHN-148234 // JVNDB: JVNDB-2019-002427 // CNNVD: CNNVD-201903-149 // NVD: CVE-2019-1612 // NVD: CVE-2019-1612

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

problemtype:CWE-77

Trust: 1.0

sources: VULHUB: VHN-148234 // JVNDB: JVNDB-2019-002427 // NVD: CVE-2019-1612

THREAT TYPE

local

Trust: 0.9

sources: BID: 107388 // CNNVD: CNNVD-201903-149

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-201903-149

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-002427

PATCH

title:cisco-sa-20190306-nxos-cmdinj-1612url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1612

Trust: 0.8

title:Patch for Cisco NX-OS Software CLI command injection vulnerability (CNVD-2020-47610)url:https://www.cnvd.org.cn/patchInfo/show/231481

Trust: 0.6

title:Cisco NX-OS Software Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89829

Trust: 0.6

sources: CNVD: CNVD-2020-47610 // JVNDB: JVNDB-2019-002427 // CNNVD: CNNVD-201903-149

EXTERNAL IDS

db:NVDid:CVE-2019-1612

Trust: 3.4

db:BIDid:107388

Trust: 1.4

db:JVNDBid:JVNDB-2019-002427

Trust: 0.8

db:CNNVDid:CNNVD-201903-149

Trust: 0.7

db:CNVDid:CNVD-2020-47610

Trust: 0.6

db:NSFOCUSid:42884

Trust: 0.6

db:AUSCERTid:ESB-2019.0699.2

Trust: 0.6

db:VULHUBid:VHN-148234

Trust: 0.1

sources: CNVD: CNVD-2020-47610 // VULHUB: VHN-148234 // BID: 107388 // JVNDB: JVNDB-2019-002427 // CNNVD: CNNVD-201903-149 // NVD: CVE-2019-1612

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190306-nxos-cmdinj-1612

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-1612

Trust: 1.4

url:http://www.securityfocus.com/bid/107388

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1612

Trust: 0.8

url:https://www.auscert.org.au/bulletins/76574

Trust: 0.6

url:http://www.nsfocus.net/vulndb/42884

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-nx-os-nexus-multiple-vulnerabilities-28681

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2020-47610 // VULHUB: VHN-148234 // BID: 107388 // JVNDB: JVNDB-2019-002427 // CNNVD: CNNVD-201903-149 // NVD: CVE-2019-1612

CREDITS

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.,vendor ?? ??

Trust: 0.6

sources: CNNVD: CNNVD-201903-149

SOURCES

db:CNVDid:CNVD-2020-47610
db:VULHUBid:VHN-148234
db:BIDid:107388
db:JVNDBid:JVNDB-2019-002427
db:CNNVDid:CNNVD-201903-149
db:NVDid:CVE-2019-1612

LAST UPDATE DATE

2024-08-14T13:26:50.579000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-47610date:2020-08-24T00:00:00
db:VULHUBid:VHN-148234date:2019-10-09T00:00:00
db:BIDid:107388date:2019-03-06T00:00:00
db:JVNDBid:JVNDB-2019-002427date:2019-04-09T00:00:00
db:CNNVDid:CNNVD-201903-149date:2019-03-12T00:00:00
db:NVDid:CVE-2019-1612date:2019-10-09T23:47:29.797

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-47610date:2019-08-24T00:00:00
db:VULHUBid:VHN-148234date:2019-03-11T00:00:00
db:BIDid:107388date:2019-03-06T00:00:00
db:JVNDBid:JVNDB-2019-002427date:2019-04-09T00:00:00
db:CNNVDid:CNNVD-201903-149date:2019-03-06T00:00:00
db:NVDid:CVE-2019-1612date:2019-03-11T21:29:00.793