ID

VAR-201905-0606


CVE

CVE-2019-1590


TITLE

Cisco Nexus 9000 Series Application Centric Infrastructure Mode Switch Certificate validation vulnerability in software

Trust: 0.8

sources: JVNDB: JVNDB-2019-004460

DESCRIPTION

A vulnerability in the Transport Layer Security (TLS) certificate validation functionality of Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, remote attacker to perform insecure TLS client authentication on an affected device. The vulnerability is due to insufficient TLS client certificate validations for certificates sent between the various components of an ACI fabric. An attacker who has possession of a certificate that is trusted by the Cisco Manufacturing CA and the corresponding private key could exploit this vulnerability by presenting a valid certificate while attempting to connect to the targeted device. An exploit could allow the attacker to gain full control of all other components within the ACI fabric of an affected device. Cisco Nexus 9000 Series Fabric Switches is prone to an authentication-bypass vulnerability. This may lead to further attacks. This issue is tracked by Cisco Bug ID CSCvn09791. This vulnerability stems from the lack of an effective trust management mechanism in network systems or products. Attackers can use default passwords or hard-coded passwords, hard-coded certificates, etc. to attack affected components

Trust: 1.98

sources: NVD: CVE-2019-1590 // JVNDB: JVNDB-2019-004460 // BID: 108133 // VULHUB: VHN-147992

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:14.1\(0.90\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:8.3\(0\)sk\(0.39\)

Trust: 1.0

vendor:ciscomodel:nx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus series switches 8.3 skscope:eqversion:9000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:900014.1(0.90)

Trust: 0.3

vendor:ciscomodel:nexus series switches 14.1scope:neversion:9000

Trust: 0.3

sources: BID: 108133 // JVNDB: JVNDB-2019-004460 // NVD: CVE-2019-1590

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1590
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1590
value: HIGH

Trust: 1.0

NVD: CVE-2019-1590
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201905-029
value: HIGH

Trust: 0.6

VULHUB: VHN-147992
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-1590
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-147992
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-1590
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 2.8

sources: VULHUB: VHN-147992 // JVNDB: JVNDB-2019-004460 // CNNVD: CNNVD-201905-029 // NVD: CVE-2019-1590 // NVD: CVE-2019-1590

PROBLEMTYPE DATA

problemtype:CWE-295

Trust: 1.9

sources: VULHUB: VHN-147992 // JVNDB: JVNDB-2019-004460 // NVD: CVE-2019-1590

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-029

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201905-029

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004460

PATCH

title:cisco-sa-20190501-aci-insecure-fabricurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-insecure-fabric

Trust: 0.8

title:Cisco Nexus 9000 Series Switch Repair measures for trust management problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92180

Trust: 0.6

sources: JVNDB: JVNDB-2019-004460 // CNNVD: CNNVD-201905-029

EXTERNAL IDS

db:NVDid:CVE-2019-1590

Trust: 2.8

db:BIDid:108133

Trust: 1.0

db:JVNDBid:JVNDB-2019-004460

Trust: 0.8

db:CNNVDid:CNNVD-201905-029

Trust: 0.7

db:AUSCERTid:ESB-2019.1508.4

Trust: 0.6

db:VULHUBid:VHN-147992

Trust: 0.1

sources: VULHUB: VHN-147992 // BID: 108133 // JVNDB: JVNDB-2019-004460 // CNNVD: CNNVD-201905-029 // NVD: CVE-2019-1590

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-aci-insecure-fabric

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-1590

Trust: 1.4

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1590

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-nexus9k-rpe

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-nexus-9000-aci-privilege-escalation-via-insecure-fabric-authentication-29182

Trust: 0.6

url:https://www.securityfocus.com/bid/108133

Trust: 0.6

url:https://www.auscert.org.au/bulletins/80070

Trust: 0.6

sources: VULHUB: VHN-147992 // BID: 108133 // JVNDB: JVNDB-2019-004460 // CNNVD: CNNVD-201905-029 // NVD: CVE-2019-1590

CREDITS

Costin Enache with Detack GmbH .

Trust: 0.6

sources: CNNVD: CNNVD-201905-029

SOURCES

db:VULHUBid:VHN-147992
db:BIDid:108133
db:JVNDBid:JVNDB-2019-004460
db:CNNVDid:CNNVD-201905-029
db:NVDid:CVE-2019-1590

LAST UPDATE DATE

2024-11-23T20:15:08.872000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-147992date:2019-10-09T00:00:00
db:BIDid:108133date:2019-05-01T00:00:00
db:JVNDBid:JVNDB-2019-004460date:2019-06-03T00:00:00
db:CNNVDid:CNNVD-201905-029date:2019-05-14T00:00:00
db:NVDid:CVE-2019-1590date:2024-11-21T04:36:52.313

SOURCES RELEASE DATE

db:VULHUBid:VHN-147992date:2019-05-03T00:00:00
db:BIDid:108133date:2019-05-01T00:00:00
db:JVNDBid:JVNDB-2019-004460date:2019-06-03T00:00:00
db:CNNVDid:CNNVD-201905-029date:2019-05-01T00:00:00
db:NVDid:CVE-2019-1590date:2019-05-03T15:29:00.587