ID

VAR-201905-0506


CVE

CVE-2019-1769


TITLE

Cisco NX-OS In software OS Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-004662

DESCRIPTION

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands on the underlying Linux operating system of an attached line card with the privilege level of root. The vulnerability is due to insufficient validation of arguments passed to a specific CLI command on the affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system of an attached line card with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Cisco NX-OS The software includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco NX-OS is prone to a local command-injection vulnerability. This issue is being tracked by Cisco Bug IDs CSCvh20032, CSCvj00299. Cisco NX-OS Software is a data center-level operating system software used by a set of switches of Cisco. The vulnerability stems from the fact that the network system or product does not correctly filter special characters, commands, etc. in the process of constructing executable commands of the operating system from external input data. The following products and versions are affected: Cisco Nexus 3000 Series Switches; Nexus 3500 Platform Switches; Nexus 3600 Platform Switches; Nexus 9000 Series Switches in standalone NX-OS mode; Nexus 9500 R-Series Switching Platform

Trust: 1.98

sources: NVD: CVE-2019-1769 // JVNDB: JVNDB-2019-004662 // BID: 108393 // VULHUB: VHN-149961

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:gteversion:7.0\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.0\(3\)i7\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.0\(3\)f3\(5\)

Trust: 1.0

vendor:ciscomodel:nx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:nx-os 7.0 i7scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:7.0(3)

Trust: 0.3

vendor:ciscomodel:nexus r-series switching platformscope:eqversion:95000

Trust: 0.3

vendor:ciscomodel:nexus series switches in standalone nx-os modescope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:36000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:35000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 f3scope:neversion: -

Trust: 0.3

sources: BID: 108393 // JVNDB: JVNDB-2019-004662 // NVD: CVE-2019-1769

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1769
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1769
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1769
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201905-657
value: MEDIUM

Trust: 0.6

VULHUB: VHN-149961
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-1769
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-149961
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

ykramarz@cisco.com: CVE-2019-1769
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-1769
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-149961 // JVNDB: JVNDB-2019-004662 // CNNVD: CNNVD-201905-657 // NVD: CVE-2019-1769 // NVD: CVE-2019-1769

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-149961 // JVNDB: JVNDB-2019-004662 // NVD: CVE-2019-1769

THREAT TYPE

local

Trust: 0.9

sources: BID: 108393 // CNNVD: CNNVD-201905-657

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201905-657

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004662

PATCH

title:cisco-sa-20190515-nxos-linecardinj-1769url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-linecardinj-1769

Trust: 0.8

title:Cisco NX-OS Software Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92782

Trust: 0.6

sources: JVNDB: JVNDB-2019-004662 // CNNVD: CNNVD-201905-657

EXTERNAL IDS

db:NVDid:CVE-2019-1769

Trust: 2.8

db:BIDid:108393

Trust: 2.0

db:JVNDBid:JVNDB-2019-004662

Trust: 0.8

db:CNNVDid:CNNVD-201905-657

Trust: 0.7

db:AUSCERTid:ESB-2019.1759.4

Trust: 0.6

db:AUSCERTid:ESB-2019.1759.3

Trust: 0.6

db:AUSCERTid:ESB-2019.1759.5

Trust: 0.6

db:VULHUBid:VHN-149961

Trust: 0.1

sources: VULHUB: VHN-149961 // BID: 108393 // JVNDB: JVNDB-2019-004662 // CNNVD: CNNVD-201905-657 // NVD: CVE-2019-1769

REFERENCES

url:http://www.securityfocus.com/bid/108393

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-linecardinj-1769

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-1769

Trust: 1.4

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1769

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-fxos-nxos-cmdinj-1781-1782

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-snmp-dos

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-fxos-info

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-conf-bypass

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-cmdinj-1795

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-fxos-cmdinj-1780

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-nxos-fxos-cmdinj-1779

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1759.5/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1759.4/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1759.3/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/81118

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-nx-os-shell-command-execution-via-line-card-29335

Trust: 0.6

sources: VULHUB: VHN-149961 // BID: 108393 // JVNDB: JVNDB-2019-004662 // CNNVD: CNNVD-201905-657 // NVD: CVE-2019-1769

CREDITS

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.,Cisco

Trust: 0.6

sources: CNNVD: CNNVD-201905-657

SOURCES

db:VULHUBid:VHN-149961
db:BIDid:108393
db:JVNDBid:JVNDB-2019-004662
db:CNNVDid:CNNVD-201905-657
db:NVDid:CVE-2019-1769

LAST UPDATE DATE

2024-08-14T13:26:30.288000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-149961date:2019-05-21T00:00:00
db:BIDid:108393date:2019-05-15T00:00:00
db:JVNDBid:JVNDB-2019-004662date:2019-06-06T00:00:00
db:CNNVDid:CNNVD-201905-657date:2020-02-25T00:00:00
db:NVDid:CVE-2019-1769date:2023-03-24T18:04:27.753

SOURCES RELEASE DATE

db:VULHUBid:VHN-149961date:2019-05-15T00:00:00
db:BIDid:108393date:2019-05-15T00:00:00
db:JVNDBid:JVNDB-2019-004662date:2019-06-06T00:00:00
db:CNNVDid:CNNVD-201905-657date:2019-05-15T00:00:00
db:NVDid:CVE-2019-1769date:2019-05-15T20:29:00.760