ID

VAR-201905-0505


CVE

CVE-2019-1768


TITLE

Cisco NX-OS Software buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-004596

DESCRIPTION

A vulnerability in the implementation of a specific CLI command for Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to cause a buffer overflow condition or perform command injection. This could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to a certain CLI command. An attacker could exploit this vulnerability by including malicious input as the argument of the affected CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. An attacker would need valid administrator credentials to exploit these vulnerabilities. Cisco NX-OS Software is prone to multiple security vulnerabilities vulnerabilities. Failed exploits will result in denial-of-service condition. These issues are being tracked by Cisco Bug IDs CSCvh76129, CSCvh76132, CSCvj00497, CSCvj10162

Trust: 1.89

sources: NVD: CVE-2019-1768 // JVNDB: JVNDB-2019-004596 // BID: 108386

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:ltversion:8.3\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:nx-os 7.0 i7scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i4scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:7.0(3)

Trust: 0.3

vendor:ciscomodel:nexus r-series switching platformscope:eqversion:95000

Trust: 0.3

vendor:ciscomodel:nexus series switches in standalone nx-os modescope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.0 i7scope:eqversion:9000

Trust: 0.3

vendor:ciscomodel:nexus series switches 7.0 f3scope:eqversion:9000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:36000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:35000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 f3scope:neversion: -

Trust: 0.3

sources: BID: 108386 // JVNDB: JVNDB-2019-004596 // NVD: CVE-2019-1768

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1768
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1768
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1768
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201905-700
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2019-1768
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ykramarz@cisco.com: CVE-2019-1768
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-1768
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: JVNDB: JVNDB-2019-004596 // CNNVD: CNNVD-201905-700 // NVD: CVE-2019-1768 // NVD: CVE-2019-1768

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-77

Trust: 0.8

sources: JVNDB: JVNDB-2019-004596 // NVD: CVE-2019-1768

THREAT TYPE

local

Trust: 0.9

sources: BID: 108386 // CNNVD: CNNVD-201905-700

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201905-700

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004596

PATCH

title:cisco-sa-20190515-nxos-overflow-injurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-overflow-inj

Trust: 0.8

title:Cisco NX-OS Software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92824

Trust: 0.6

sources: JVNDB: JVNDB-2019-004596 // CNNVD: CNNVD-201905-700

EXTERNAL IDS

db:NVDid:CVE-2019-1768

Trust: 2.7

db:BIDid:108386

Trust: 1.9

db:JVNDBid:JVNDB-2019-004596

Trust: 0.8

db:AUSCERTid:ESB-2019.1756.4

Trust: 0.6

db:AUSCERTid:ESB-2019.1756.3

Trust: 0.6

db:CNNVDid:CNNVD-201905-700

Trust: 0.6

sources: BID: 108386 // JVNDB: JVNDB-2019-004596 // CNNVD: CNNVD-201905-700 // NVD: CVE-2019-1768

REFERENCES

url:http://www.securityfocus.com/bid/108386

Trust: 2.2

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-overflow-inj

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-1768

Trust: 1.4

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1768

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-ssh-info

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-rpm-injec

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-pyth-escal

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-psvb

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-nxapi-xss

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-linecardinj-1769

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1791

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1790

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmd-inject-1784

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1783

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1778

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1776

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1770

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1735

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1774-1775

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cli-bypass

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-bash-bypass

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-file-write

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-sisv2

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1756.3/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/81106

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-nx-os-buffer-overflow-via-cli-29334

Trust: 0.6

sources: BID: 108386 // JVNDB: JVNDB-2019-004596 // CNNVD: CNNVD-201905-700 // NVD: CVE-2019-1768

CREDITS

Cisco

Trust: 0.9

sources: BID: 108386 // CNNVD: CNNVD-201905-700

SOURCES

db:BIDid:108386
db:JVNDBid:JVNDB-2019-004596
db:CNNVDid:CNNVD-201905-700
db:NVDid:CVE-2019-1768

LAST UPDATE DATE

2024-11-23T21:37:18.244000+00:00


SOURCES UPDATE DATE

db:BIDid:108386date:2019-05-15T00:00:00
db:JVNDBid:JVNDB-2019-004596date:2019-06-05T00:00:00
db:CNNVDid:CNNVD-201905-700date:2020-10-28T00:00:00
db:NVDid:CVE-2019-1768date:2024-11-21T04:37:20.043

SOURCES RELEASE DATE

db:BIDid:108386date:2019-05-15T00:00:00
db:JVNDBid:JVNDB-2019-004596date:2019-06-05T00:00:00
db:CNNVDid:CNNVD-201905-700date:2019-05-15T00:00:00
db:NVDid:CVE-2019-1768date:2019-05-16T02:29:00.247