ID

VAR-201909-0200


CVE

CVE-2019-12717


TITLE

Cisco NX-OS Software Operating System Command Injection Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2019-42597 // CNNVD: CNNVD-201909-1140

DESCRIPTION

A vulnerability in a CLI command related to the virtualization manager (VMAN) in Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on an affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges, which may lead to complete system compromise. An attacker would need valid administrator credentials to exploit this vulnerability. Cisco NX-OS The software includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Nexus 3000 Series Switches, etc. are the products of the United States Cisco. Cisco Nexus 3000 Series Switches is a 3000 series switch. Cisco Nexus 3500 Platform Switches is a 3500 series platform switch. Cisco Nexus 3600 Platform Switches is a 3600 series platform switch. Cisco NX-OS Software is a suite of data center-level operating system software for switches. Execute any command on the operating system

Trust: 2.25

sources: NVD: CVE-2019-12717 // JVNDB: JVNDB-2019-009751 // CNVD: CNVD-2019-42597 // VULHUB: VHN-144491

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-42597

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:gteversion:7.0

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.0\(3\)i7\(6\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:6.0\(2\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:9.2\(3\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:8.0\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.3\(5\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:9.2

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:6.2

Trust: 1.0

vendor:ciscomodel:nx-osscope:gteversion:7.0\(3\)f

Trust: 1.0

vendor:ciscomodel:nx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus series switchescope:eqversion:3000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:6000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:7700

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5600

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5500

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:3500

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:70000

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:3600

Trust: 0.6

vendor:ciscomodel:nexus r-series switching platformscope:eqversion:9500

Trust: 0.6

vendor:ciscomodel:nexus series switches in standalone nx-os modescope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.02

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.02a65

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.02a68

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.02a67

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.02a64

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.02a63

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.02a62

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.02a66

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.02a61

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:6.02a

Trust: 0.6

sources: CNVD: CNVD-2019-42597 // JVNDB: JVNDB-2019-009751 // CNNVD: CNNVD-201909-1140 // NVD: CVE-2019-12717

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-12717
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-12717
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-12717
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-42597
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201909-1140
value: HIGH

Trust: 0.6

VULHUB: VHN-144491
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-12717
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-42597
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-144491
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-12717
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2019-12717
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: CVE-2019-12717
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-42597 // VULHUB: VHN-144491 // JVNDB: JVNDB-2019-009751 // CNNVD: CNNVD-201909-1140 // NVD: CVE-2019-12717 // NVD: CVE-2019-12717

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-144491 // JVNDB: JVNDB-2019-009751 // NVD: CVE-2019-12717

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201909-1140

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201909-1140

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-009751

PATCH

title:cisco-sa-20190925-nxos-vman-cmd-injurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-nxos-vman-cmd-inj

Trust: 0.8

title:Patch for Cisco NX-OS Software Operating System Command Injection Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/192285

Trust: 0.6

title:Cisco NX-OS Software Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=98558

Trust: 0.6

sources: CNVD: CNVD-2019-42597 // JVNDB: JVNDB-2019-009751 // CNNVD: CNNVD-201909-1140

EXTERNAL IDS

db:NVDid:CVE-2019-12717

Trust: 3.1

db:JVNDBid:JVNDB-2019-009751

Trust: 0.8

db:CNNVDid:CNNVD-201909-1140

Trust: 0.7

db:CNVDid:CNVD-2019-42597

Trust: 0.6

db:AUSCERTid:ESB-2019.3618

Trust: 0.6

db:VULHUBid:VHN-144491

Trust: 0.1

sources: CNVD: CNVD-2019-42597 // VULHUB: VHN-144491 // JVNDB: JVNDB-2019-009751 // CNNVD: CNNVD-201909-1140 // NVD: CVE-2019-12717

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-12717

Trust: 2.0

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190925-nxos-vman-cmd-inj

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-12717

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2019.3618/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-nx-os-privilege-escalation-via-vman-command-injection-30436

Trust: 0.6

sources: CNVD: CNVD-2019-42597 // VULHUB: VHN-144491 // JVNDB: JVNDB-2019-009751 // CNNVD: CNNVD-201909-1140 // NVD: CVE-2019-12717

CREDITS

This vulnerability was found by Eugenio Iavarone of Cisco during internal security testing.

Trust: 0.6

sources: CNNVD: CNNVD-201909-1140

SOURCES

db:CNVDid:CNVD-2019-42597
db:VULHUBid:VHN-144491
db:JVNDBid:JVNDB-2019-009751
db:CNNVDid:CNNVD-201909-1140
db:NVDid:CVE-2019-12717

LAST UPDATE DATE

2024-11-23T22:41:21.102000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-42597date:2019-11-28T00:00:00
db:VULHUBid:VHN-144491date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2019-009751date:2019-09-30T00:00:00
db:CNNVDid:CNNVD-201909-1140date:2019-10-17T00:00:00
db:NVDid:CVE-2019-12717date:2024-11-21T04:23:25.750

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-42597date:2019-11-28T00:00:00
db:VULHUBid:VHN-144491date:2019-09-25T00:00:00
db:JVNDBid:JVNDB-2019-009751date:2019-09-30T00:00:00
db:CNNVDid:CNNVD-201909-1140date:2019-09-25T00:00:00
db:NVDid:CVE-2019-12717date:2019-09-25T21:15:11.937