ID

VAR-201903-0554


CVE

CVE-2019-1610


TITLE

Cisco NX-OS Software command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-002463

DESCRIPTION

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Nexus 3500 Platform Switches and Nexus 3000 Series Switches software versions prior to 7.0(3)I7(4) are affected. Cisco NX-OS The software contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco NX-OS Software is prone to an local command-injection vulnerability. This issue being tracked by Cisco Bug ID CSCvj61991

Trust: 1.98

sources: NVD: CVE-2019-1610 // JVNDB: JVNDB-2019-002463 // BID: 107338 // VULHUB: VHN-148212

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:lteversion:7.0\(3\)i7\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:7.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.0\(3\)i7\(4\)

Trust: 1.0

vendor:ciscomodel:nx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus series switches 7.0 i7scope:eqversion:3000

Trust: 0.6

vendor:ciscomodel:nx-os softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:35000

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.0 i7scope:neversion:3000

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.0 i4scope:neversion:3000

Trust: 0.3

sources: BID: 107338 // JVNDB: JVNDB-2019-002463 // NVD: CVE-2019-1610

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1610
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1610
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1610
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201903-157
value: MEDIUM

Trust: 0.6

VULHUB: VHN-148212
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-1610
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-148212
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-1610
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1610
baseSeverity: MEDIUM
baseScore: 4.2
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 0.8
impactScore: 3.4
version: 3.0

Trust: 1.0

NVD: CVE-2019-1610
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-148212 // JVNDB: JVNDB-2019-002463 // CNNVD: CNNVD-201903-157 // NVD: CVE-2019-1610 // NVD: CVE-2019-1610

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.9

problemtype:CWE-88

Trust: 1.1

sources: VULHUB: VHN-148212 // JVNDB: JVNDB-2019-002463 // NVD: CVE-2019-1610

THREAT TYPE

local

Trust: 0.9

sources: BID: 107338 // CNNVD: CNNVD-201903-157

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-201903-157

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-002463

PATCH

title:cisco-sa-20190306-nxos-cmdinj-1610url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-cmdinj-1610

Trust: 0.8

title:Cisco NX-OS Software Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89833

Trust: 0.6

sources: JVNDB: JVNDB-2019-002463 // CNNVD: CNNVD-201903-157

EXTERNAL IDS

db:NVDid:CVE-2019-1610

Trust: 2.8

db:BIDid:107338

Trust: 1.4

db:JVNDBid:JVNDB-2019-002463

Trust: 0.8

db:CNNVDid:CNNVD-201903-157

Trust: 0.7

db:AUSCERTid:ESB-2019.0699.2

Trust: 0.6

db:NSFOCUSid:42887

Trust: 0.6

db:VULHUBid:VHN-148212

Trust: 0.1

sources: VULHUB: VHN-148212 // BID: 107338 // JVNDB: JVNDB-2019-002463 // CNNVD: CNNVD-201903-157 // NVD: CVE-2019-1610

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190306-nxos-cmdinj-1610

Trust: 2.0

url:http://www.securityfocus.com/bid/107338

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1610

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-1610

Trust: 0.8

url:http://www.nsfocus.net/vulndb/42887

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76574

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-nx-os-nexus-multiple-vulnerabilities-28681

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-148212 // BID: 107338 // JVNDB: JVNDB-2019-002463 // CNNVD: CNNVD-201903-157 // NVD: CVE-2019-1610

CREDITS

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.,vendor ?? ??

Trust: 0.6

sources: CNNVD: CNNVD-201903-157

SOURCES

db:VULHUBid:VHN-148212
db:BIDid:107338
db:JVNDBid:JVNDB-2019-002463
db:CNNVDid:CNNVD-201903-157
db:NVDid:CVE-2019-1610

LAST UPDATE DATE

2024-08-14T13:26:50.685000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-148212date:2020-10-05T00:00:00
db:BIDid:107338date:2019-03-06T00:00:00
db:JVNDBid:JVNDB-2019-002463date:2019-04-09T00:00:00
db:CNNVDid:CNNVD-201903-157date:2019-03-12T00:00:00
db:NVDid:CVE-2019-1610date:2020-10-05T19:52:25.697

SOURCES RELEASE DATE

db:VULHUBid:VHN-148212date:2019-03-11T00:00:00
db:BIDid:107338date:2019-03-06T00:00:00
db:JVNDBid:JVNDB-2019-002463date:2019-04-09T00:00:00
db:CNNVDid:CNNVD-201903-157date:2019-03-06T00:00:00
db:NVDid:CVE-2019-1610date:2019-03-11T21:29:00.717