ID

VAR-201905-0504


CVE

CVE-2019-1767


TITLE

Cisco NX-OS Software command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-004531

DESCRIPTION

A vulnerability in the implementation of a specific CLI command for Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to cause a buffer overflow condition or perform command injection. This could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to a certain CLI command. An attacker could exploit this vulnerability by including malicious input as the argument of the affected CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. An attacker would need valid administrator credentials to exploit these vulnerabilities. NX-OS versions prior to 8.3(1) are affected. Cisco NX-OS The software contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco NX-OS Software is prone to multiple security vulnerabilities vulnerabilities. Failed exploits will result in denial-of-service condition. These issues are being tracked by Cisco Bug IDs CSCvh76129, CSCvh76132, CSCvj00497, CSCvj10162. Cisco Nexus 3000 Series Switches are all products of Cisco (Cisco). Cisco Nexus 3000 Series Switches is a 3000 series switch. Cisco Nexus 3500 Platform Switches is a 3500 series platform switch. Cisco Nexus 3600 Platform Switches is a 3600 series platform switch. Cisco NX-OS Software is a set of data center-level operating system software used by switches. This vulnerability stems from the fact that the network system or product does not correctly filter special elements in the process of constructing executable commands from external input data. The following products and versions are affected: Cisco Nexus 3000 Series Switches; Nexus 3500 Platform Switches; Nexus 3600 Platform Switches; Nexus 9000 Series Switches in standalone NX-OS mode; Nexus 9500 R-Series Switching Platform

Trust: 1.98

sources: NVD: CVE-2019-1767 // JVNDB: JVNDB-2019-004531 // BID: 108386 // VULHUB: VHN-149939

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:ltversion:8.3\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:8.3(1)

Trust: 0.8

vendor:ciscomodel:nx-os 7.0 i7scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i4scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:7.0(3)

Trust: 0.3

vendor:ciscomodel:nexus r-series switching platformscope:eqversion:95000

Trust: 0.3

vendor:ciscomodel:nexus series switches in standalone nx-os modescope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.0 i7scope:eqversion:9000

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.0 f3scope:eqversion:9000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:36000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:35000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 f3scope:neversion: -

Trust: 0.3

sources: BID: 108386 // JVNDB: JVNDB-2019-004531 // NVD: CVE-2019-1767

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1767
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1767
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1767
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201905-652
value: MEDIUM

Trust: 0.6

VULHUB: VHN-149939
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-1767
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-149939
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

ykramarz@cisco.com: CVE-2019-1767
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-1767
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-149939 // JVNDB: JVNDB-2019-004531 // CNNVD: CNNVD-201905-652 // NVD: CVE-2019-1767 // NVD: CVE-2019-1767

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-77

Trust: 0.9

sources: VULHUB: VHN-149939 // JVNDB: JVNDB-2019-004531 // NVD: CVE-2019-1767

THREAT TYPE

local

Trust: 0.9

sources: BID: 108386 // CNNVD: CNNVD-201905-652

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201905-652

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004531

PATCH

title:cisco-sa-20190515-nxos-overflow-injurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-overflow-inj

Trust: 0.8

title:Cisco NX-OS Software Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92777

Trust: 0.6

sources: JVNDB: JVNDB-2019-004531 // CNNVD: CNNVD-201905-652

EXTERNAL IDS

db:NVDid:CVE-2019-1767

Trust: 2.8

db:BIDid:108386

Trust: 2.0

db:JVNDBid:JVNDB-2019-004531

Trust: 0.8

db:CNNVDid:CNNVD-201905-652

Trust: 0.7

db:AUSCERTid:ESB-2019.1756.4

Trust: 0.6

db:AUSCERTid:ESB-2019.1756.3

Trust: 0.6

db:VULHUBid:VHN-149939

Trust: 0.1

sources: VULHUB: VHN-149939 // BID: 108386 // JVNDB: JVNDB-2019-004531 // CNNVD: CNNVD-201905-652 // NVD: CVE-2019-1767

REFERENCES

url:http://www.securityfocus.com/bid/108386

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-overflow-inj

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-1767

Trust: 1.4

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1767

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-ssh-info

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-rpm-injec

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-pyth-escal

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-psvb

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-nxapi-xss

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-linecardinj-1769

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1791

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1790

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmd-inject-1784

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1783

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1778

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1776

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1770

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1735

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1774-1775

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cli-bypass

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-bash-bypass

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-file-write

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-sisv2

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1756.3/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/81106

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-nx-os-buffer-overflow-via-cli-29334

Trust: 0.6

sources: VULHUB: VHN-149939 // BID: 108386 // JVNDB: JVNDB-2019-004531 // CNNVD: CNNVD-201905-652 // NVD: CVE-2019-1767

CREDITS

Cisco

Trust: 0.9

sources: BID: 108386 // CNNVD: CNNVD-201905-652

SOURCES

db:VULHUBid:VHN-149939
db:BIDid:108386
db:JVNDBid:JVNDB-2019-004531
db:CNNVDid:CNNVD-201905-652
db:NVDid:CVE-2019-1767

LAST UPDATE DATE

2024-08-14T13:55:26.948000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-149939date:2020-10-16T00:00:00
db:BIDid:108386date:2019-05-15T00:00:00
db:JVNDBid:JVNDB-2019-004531date:2019-06-04T00:00:00
db:CNNVDid:CNNVD-201905-652date:2020-10-28T00:00:00
db:NVDid:CVE-2019-1767date:2020-10-16T16:13:06.257

SOURCES RELEASE DATE

db:VULHUBid:VHN-149939date:2019-05-15T00:00:00
db:BIDid:108386date:2019-05-15T00:00:00
db:JVNDBid:JVNDB-2019-004531date:2019-06-04T00:00:00
db:CNNVDid:CNNVD-201905-652date:2019-05-15T00:00:00
db:NVDid:CVE-2019-1767date:2019-05-15T19:29:00.697