// For flags

CVE-2019-1591

Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Shell Escape Vulnerability

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in a specific CLI command implementation of Cisco Nexus 9000 Series ACI Mode Switch Software could allow an authenticated, local attacker to escape a restricted shell on an affected device. The vulnerability is due to insufficient sanitization of user-supplied input when issuing a specific CLI command with parameters on an affected device. An attacker could exploit this vulnerability by authenticating to the device CLI and issuing certain commands. A successful exploit could allow the attacker to escape the restricted shell and execute arbitrary commands with root-level privileges on the affected device. This vulnerability only affects Cisco Nexus 9000 Series ACI Mode Switches that are running a release prior to 14.0(3d).

Una vulnerabilidad en la implementación de un comando de la interfaz de la línea de comandos (CLI) específico de Cisco Nexus 9000 Series ACI Mode Switch Software podría permitir a un atacante local autenticado escapar de un shell restringido en un dispositivo afectado. Esta vulnerabilidad se debe a un saneamiento insuficiente de entradas proporcionadas por el usuario al enviar un comando de CLI específico con parámetros en un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad autenticándose en el CLI del dispositivo y enviando determinados comandos. Un exploit con éxito podría permitir que el atacante escape del shell restringido y ejecute comandos arbitrarios con privilegios root en el dispositivo afectado. Esta vulnerabilidad solo afecta a Cisco Nexus 9000 Series ACI Mode Switches que estén ejecutando una distribución anterior a la 14.0(3d).

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-03-06 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-20 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
< 14.0\(3d\)
Search vendor "Cisco" for product "Nx-os" and version " < 14.0\(3d\)"
-
Affected
in Cisco
Search vendor "Cisco"
Nexus 9000
Search vendor "Cisco" for product "Nexus 9000"
--
Safe