ID

VAR-201903-0550


CVE

CVE-2019-1606


TITLE

Cisco NX-OS Software command injection vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2019-002418 // CNNVD: CNNVD-201903-165

DESCRIPTION

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid user credentials to exploit this vulnerability. Nexus 3000, 3500, and Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(4). Cisco NX-OS The software contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco NX-OS is prone to a local command-injection vulnerability. This issue is being tracked by Cisco Bug ID CSCvh85760. Cisco NX-OS Software is a data center-level operating system software used by a set of switches of Cisco

Trust: 1.98

sources: NVD: CVE-2019-1606 // JVNDB: JVNDB-2019-002418 // BID: 107345 // VULHUB: VHN-148168

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:gteversion:7.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.0\(3\)i7\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:7.0\(3\)i7

Trust: 1.0

vendor:ciscomodel:nx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:nx-os 7.0 i7scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:7.0(3)

Trust: 0.3

vendor:ciscomodel:nexus series switches in standalone nx-os modescope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.0 ihd8scope:eqversion:9000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:35000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:neversion:90009.2(1)

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.0 i7scope:neversion:9000

Trust: 0.3

sources: BID: 107345 // JVNDB: JVNDB-2019-002418 // NVD: CVE-2019-1606

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1606
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1606
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1606
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201903-165
value: HIGH

Trust: 0.6

VULHUB: VHN-148168
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-1606
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-148168
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-1606
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1606
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 1.8
impactScore: 3.4
version: 3.0

Trust: 1.0

NVD: CVE-2019-1606
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-148168 // JVNDB: JVNDB-2019-002418 // CNNVD: CNNVD-201903-165 // NVD: CVE-2019-1606 // NVD: CVE-2019-1606

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.9

problemtype:CWE-88

Trust: 1.1

sources: VULHUB: VHN-148168 // JVNDB: JVNDB-2019-002418 // NVD: CVE-2019-1606

THREAT TYPE

local

Trust: 0.9

sources: BID: 107345 // CNNVD: CNNVD-201903-165

TYPE

parameter injection

Trust: 0.6

sources: CNNVD: CNNVD-201903-165

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-002418

PATCH

title:cisco-sa-20190306-nxos-cmdinj-1606url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1606

Trust: 0.8

title:Cisco NX-OS Software Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89840

Trust: 0.6

sources: JVNDB: JVNDB-2019-002418 // CNNVD: CNNVD-201903-165

EXTERNAL IDS

db:NVDid:CVE-2019-1606

Trust: 2.8

db:BIDid:107345

Trust: 2.0

db:JVNDBid:JVNDB-2019-002418

Trust: 0.8

db:CNNVDid:CNNVD-201903-165

Trust: 0.7

db:AUSCERTid:ESB-2019.0699.2

Trust: 0.6

db:NSFOCUSid:42877

Trust: 0.6

db:VULHUBid:VHN-148168

Trust: 0.1

sources: VULHUB: VHN-148168 // BID: 107345 // JVNDB: JVNDB-2019-002418 // CNNVD: CNNVD-201903-165 // NVD: CVE-2019-1606

REFERENCES

url:http://www.securityfocus.com/bid/107345

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190306-nxos-cmdinj-1606

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-1606

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1606

Trust: 0.8

url:http://www.nsfocus.net/vulndb/42877

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76574

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-nx-os-nexus-multiple-vulnerabilities-28681

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-148168 // BID: 107345 // JVNDB: JVNDB-2019-002418 // CNNVD: CNNVD-201903-165 // NVD: CVE-2019-1606

CREDITS

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.,vendor ?? ??

Trust: 0.6

sources: CNNVD: CNNVD-201903-165

SOURCES

db:VULHUBid:VHN-148168
db:BIDid:107345
db:JVNDBid:JVNDB-2019-002418
db:CNNVDid:CNNVD-201903-165
db:NVDid:CVE-2019-1606

LAST UPDATE DATE

2024-08-14T13:26:50.430000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-148168date:2020-10-05T00:00:00
db:BIDid:107345date:2019-03-06T00:00:00
db:JVNDBid:JVNDB-2019-002418date:2019-04-09T00:00:00
db:CNNVDid:CNNVD-201903-165date:2020-10-09T00:00:00
db:NVDid:CVE-2019-1606date:2020-10-05T19:49:28.313

SOURCES RELEASE DATE

db:VULHUBid:VHN-148168date:2019-03-08T00:00:00
db:BIDid:107345date:2019-03-06T00:00:00
db:JVNDBid:JVNDB-2019-002418date:2019-04-09T00:00:00
db:CNNVDid:CNNVD-201903-165date:2019-03-06T00:00:00
db:NVDid:CVE-2019-1606date:2019-03-08T20:29:00.370